City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.170.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11083
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.170.164.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:25:27 CST 2022
;; MSG SIZE  rcvd: 107164.170.207.14.in-addr.arpa domain name pointer mx-ll-14.207.170-164.dynamic.3bb.in.th.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
164.170.207.14.in-addr.arpa	name = mx-ll-14.207.170-164.dynamic.3bb.in.th.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 106.54.82.34 | attack | May 23 16:24:32 ns382633 sshd\[26600\]: Invalid user ufq from 106.54.82.34 port 48090 May 23 16:24:32 ns382633 sshd\[26600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.82.34 May 23 16:24:34 ns382633 sshd\[26600\]: Failed password for invalid user ufq from 106.54.82.34 port 48090 ssh2 May 23 16:31:46 ns382633 sshd\[28134\]: Invalid user jde from 106.54.82.34 port 58106 May 23 16:31:46 ns382633 sshd\[28134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.82.34 | 2020-05-24 01:57:56 | 
| 132.255.228.38 | attack | k+ssh-bruteforce | 2020-05-24 01:52:03 | 
| 132.232.38.192 | attack | Invalid user th from 132.232.38.192 port 3196 | 2020-05-24 01:52:28 | 
| 47.91.79.19 | attackbots | Invalid user gop from 47.91.79.19 port 42626 | 2020-05-24 01:36:41 | 
| 211.171.72.149 | attack | Invalid user hxhtxftp from 211.171.72.149 port 58775 | 2020-05-24 02:09:25 | 
| 31.17.20.62 | attack | Invalid user pi from 31.17.20.62 port 40434 | 2020-05-24 01:38:35 | 
| 160.124.140.136 | attackspam | Invalid user zgy from 160.124.140.136 port 50204 | 2020-05-24 01:47:51 | 
| 64.227.58.213 | attackspambots | May 23 15:41:07 home sshd[12564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.58.213 May 23 15:41:09 home sshd[12564]: Failed password for invalid user spz from 64.227.58.213 port 46072 ssh2 May 23 15:45:10 home sshd[12892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.58.213 ... | 2020-05-24 02:01:54 | 
| 36.2.14.218 | attackbots | Invalid user pi from 36.2.14.218 port 43458 | 2020-05-24 02:05:33 | 
| 69.251.82.109 | attackbots | Bruteforce detected by fail2ban | 2020-05-24 01:31:09 | 
| 139.199.157.235 | attackbots | Invalid user qhj from 139.199.157.235 port 40160 | 2020-05-24 01:49:55 | 
| 49.233.185.109 | attackbotsspam | May 23 17:49:23 ns382633 sshd\[8703\]: Invalid user vhz from 49.233.185.109 port 48188 May 23 17:49:23 ns382633 sshd\[8703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.185.109 May 23 17:49:26 ns382633 sshd\[8703\]: Failed password for invalid user vhz from 49.233.185.109 port 48188 ssh2 May 23 18:05:50 ns382633 sshd\[11801\]: Invalid user ckd from 49.233.185.109 port 45414 May 23 18:05:50 ns382633 sshd\[11801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.185.109 | 2020-05-24 01:35:03 | 
| 61.189.43.58 | attackspam | Failed password for invalid user xpz from 61.189.43.58 port 44912 ssh2 | 2020-05-24 01:32:52 | 
| 58.33.35.82 | attackspam | 2020-05-23T17:29:57.020651ollin.zadara.org sshd[17647]: Invalid user brainiumdev from 58.33.35.82 port 2673 2020-05-23T17:29:58.870394ollin.zadara.org sshd[17647]: Failed password for invalid user brainiumdev from 58.33.35.82 port 2673 ssh2 ... | 2020-05-24 02:02:55 | 
| 106.12.181.144 | attackbotsspam | May 23 17:55:12 ip-172-31-61-156 sshd[6044]: Failed password for invalid user dzl from 106.12.181.144 port 35148 ssh2 May 23 17:55:10 ip-172-31-61-156 sshd[6044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.144 May 23 17:55:10 ip-172-31-61-156 sshd[6044]: Invalid user dzl from 106.12.181.144 May 23 17:55:12 ip-172-31-61-156 sshd[6044]: Failed password for invalid user dzl from 106.12.181.144 port 35148 ssh2 May 23 17:57:08 ip-172-31-61-156 sshd[6214]: Invalid user mdt from 106.12.181.144 ... | 2020-05-24 01:58:47 |