City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.51.47.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.51.47.254.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120701 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 03:00:06 CST 2024
;; MSG SIZE  rcvd: 106
        Host 254.47.51.139.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 254.47.51.139.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 172.217.17.133 | attack | SSH login attempts.  | 
                    2020-03-29 16:45:16 | 
| 93.5.62.61 | attackbotsspam | $f2bV_matches  | 
                    2020-03-29 16:08:10 | 
| 203.189.253.243 | attackspambots | Mar 29 10:15:47 vpn01 sshd[18545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.189.253.243 Mar 29 10:15:49 vpn01 sshd[18545]: Failed password for invalid user yyc from 203.189.253.243 port 53714 ssh2 ...  | 
                    2020-03-29 16:16:18 | 
| 122.114.157.7 | attack | Mar 29 06:40:42 mout sshd[24564]: Connection closed by 122.114.157.7 port 41344 [preauth]  | 
                    2020-03-29 16:12:34 | 
| 187.202.60.152 | attackspam | Invalid user suv from 187.202.60.152 port 18606  | 
                    2020-03-29 16:17:48 | 
| 104.47.17.161 | attack | SSH login attempts.  | 
                    2020-03-29 16:44:33 | 
| 187.123.56.57 | attackbotsspam | ssh brute force  | 
                    2020-03-29 16:18:22 | 
| 54.37.224.163 | attackbotsspam | Mar 29 07:32:57 v22018086721571380 sshd[2133]: Failed password for invalid user ynt from 54.37.224.163 port 44228 ssh2 Mar 29 07:44:42 v22018086721571380 sshd[4669]: Failed password for invalid user qwz from 54.37.224.163 port 46014 ssh2  | 
                    2020-03-29 16:08:30 | 
| 51.15.109.111 | attack | Mar 29 02:22:12 NPSTNNYC01T sshd[29115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.109.111 Mar 29 02:22:14 NPSTNNYC01T sshd[29115]: Failed password for invalid user dww from 51.15.109.111 port 59800 ssh2 Mar 29 02:28:05 NPSTNNYC01T sshd[29300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.109.111 ...  | 
                    2020-03-29 16:30:57 | 
| 181.48.28.13 | attackbots | $f2bV_matches  | 
                    2020-03-29 16:34:57 | 
| 198.98.52.100 | attackbotsspam | Mar 29 09:41:34 ks10 sshd[1305891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.52.100 Mar 29 09:41:36 ks10 sshd[1305891]: Failed password for invalid user admin from 198.98.52.100 port 56866 ssh2 ...  | 
                    2020-03-29 16:11:21 | 
| 177.139.194.62 | attackspam | Mar 29 10:13:35 localhost sshd[19422]: Invalid user rdv from 177.139.194.62 port 54424 ...  | 
                    2020-03-29 16:24:44 | 
| 34.80.223.251 | attack | Invalid user szr from 34.80.223.251 port 10891  | 
                    2020-03-29 16:36:31 | 
| 143.0.68.15 | attack | SSH login attempts.  | 
                    2020-03-29 16:12:02 | 
| 186.215.202.11 | attackbotsspam | SSH Brute-Forcing (server2)  | 
                    2020-03-29 16:43:24 |