City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.3.189.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.3.189.145.			IN	A
;; AUTHORITY SECTION:
.			7	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052400 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 16:01:17 CST 2023
;; MSG SIZE  rcvd: 106
        Host 145.189.3.139.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 145.189.3.139.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 35.199.149.162 | attackbotsspam | RDP Brute-Force (Grieskirchen RZ1)  | 
                    2019-06-23 20:14:50 | 
| 23.94.154.44 | attack | NAME : CC-16 CIDR : 23.94.0.0/15 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - New York - block certain countries :) IP: 23.94.154.44  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl | 
                    2019-06-23 20:15:36 | 
| 163.172.67.146 | attackspam | Automatic report - Web App Attack  | 
                    2019-06-23 19:34:25 | 
| 112.85.42.237 | attackspambots | 2019-06-23T11:20:14.113934abusebot-7.cloudsearch.cf sshd\[3860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237 user=root  | 
                    2019-06-23 19:44:34 | 
| 46.229.168.162 | attackspam | Malicious Traffic/Form Submission  | 
                    2019-06-23 20:12:56 | 
| 192.42.116.22 | attackspam | Automatic report - Web App Attack  | 
                    2019-06-23 19:41:19 | 
| 125.123.68.83 | attackbots | Jun 23 12:01:20 ns3042688 proftpd\[14996\]: 127.0.0.1 \(125.123.68.83\[125.123.68.83\]\) - USER anonymous: no such user found from 125.123.68.83 \[125.123.68.83\] to 51.254.197.112:21 Jun 23 12:01:26 ns3042688 proftpd\[15050\]: 127.0.0.1 \(125.123.68.83\[125.123.68.83\]\) - USER www: no such user found from 125.123.68.83 \[125.123.68.83\] to 51.254.197.112:21 Jun 23 12:01:30 ns3042688 proftpd\[15092\]: 127.0.0.1 \(125.123.68.83\[125.123.68.83\]\) - USER www: no such user found from 125.123.68.83 \[125.123.68.83\] to 51.254.197.112:21 Jun 23 12:01:35 ns3042688 proftpd\[15117\]: 127.0.0.1 \(125.123.68.83\[125.123.68.83\]\) - USER cesumin \(Login failed\): Incorrect password Jun 23 12:01:43 ns3042688 proftpd\[15188\]: 127.0.0.1 \(125.123.68.83\[125.123.68.83\]\) - USER cesumin \(Login failed\): Incorrect password ...  | 
                    2019-06-23 20:07:38 | 
| 129.211.24.70 | attackspambots | Jun 23 12:46:49 core01 sshd\[18232\]: Invalid user coke from 129.211.24.70 port 53888 Jun 23 12:46:49 core01 sshd\[18232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.70 ...  | 
                    2019-06-23 19:53:55 | 
| 185.137.111.188 | attackbotsspam | Jun 23 13:39:25 mail postfix/smtpd\[13620\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 23 13:39:55 mail postfix/smtpd\[15528\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 23 13:40:25 mail postfix/smtpd\[13620\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6  | 
                    2019-06-23 19:49:48 | 
| 142.93.221.103 | attackspam | 2019-06-23T11:43:21.429338abusebot-4.cloudsearch.cf sshd\[4588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.221.103 user=root  | 
                    2019-06-23 20:05:12 | 
| 210.56.108.144 | attackspambots | Brute forcing Wordpress login  | 
                    2019-06-23 19:56:47 | 
| 82.102.173.84 | attackbots | firewall-block, port(s): 443/tcp  | 
                    2019-06-23 19:45:59 | 
| 107.170.202.120 | attack | MultiHost/MultiPort Probe, Scan, Hack -  | 
                    2019-06-23 19:26:39 | 
| 45.227.254.103 | attackspambots | Port scan on 9 port(s): 3526 3547 3570 3587 3606 3737 3788 3799 3891  | 
                    2019-06-23 20:13:55 | 
| 206.81.4.235 | attackspam | 20 attempts against mh-ssh on oak.magehost.pro  | 
                    2019-06-23 19:57:14 |