City: unknown
Region: unknown
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.170.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.170.216.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:25:27 CST 2022
;; MSG SIZE  rcvd: 107216.170.207.14.in-addr.arpa domain name pointer mx-ll-14.207.170-216.dynamic.3bb.in.th.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
216.170.207.14.in-addr.arpa	name = mx-ll-14.207.170-216.dynamic.3bb.in.th.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 116.246.21.23 | attack | Unauthorized connection attempt detected from IP address 116.246.21.23 to port 2220 [J] | 2020-01-24 06:00:23 | 
| 91.226.116.212 | attack | Unauthorized connection attempt from IP address 91.226.116.212 on Port 445(SMB) | 2020-01-24 06:17:44 | 
| 190.0.159.86 | attack | Jan 23 23:04:49 MainVPS sshd[31848]: Invalid user work from 190.0.159.86 port 54908 Jan 23 23:04:49 MainVPS sshd[31848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.86 Jan 23 23:04:49 MainVPS sshd[31848]: Invalid user work from 190.0.159.86 port 54908 Jan 23 23:04:51 MainVPS sshd[31848]: Failed password for invalid user work from 190.0.159.86 port 54908 ssh2 Jan 23 23:12:38 MainVPS sshd[14375]: Invalid user etserver from 190.0.159.86 port 41988 ... | 2020-01-24 06:27:36 | 
| 45.169.216.119 | attack | Unauthorized connection attempt from IP address 45.169.216.119 on Port 445(SMB) | 2020-01-24 06:34:34 | 
| 220.231.127.4 | attackbots | Unauthorized connection attempt from IP address 220.231.127.4 on Port 445(SMB) | 2020-01-24 06:15:19 | 
| 222.252.30.117 | attackbots | Jan 23 20:02:40 DAAP sshd[9171]: Invalid user temp from 222.252.30.117 port 53070 Jan 23 20:02:40 DAAP sshd[9171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.30.117 Jan 23 20:02:40 DAAP sshd[9171]: Invalid user temp from 222.252.30.117 port 53070 Jan 23 20:02:43 DAAP sshd[9171]: Failed password for invalid user temp from 222.252.30.117 port 53070 ssh2 ... | 2020-01-24 06:13:18 | 
| 51.38.230.5 | attackbots | Unauthorized connection attempt detected from IP address 51.38.230.5 to port 2220 [J] | 2020-01-24 06:20:48 | 
| 51.79.50.16 | attack | $f2bV_matches | 2020-01-24 06:11:45 | 
| 198.108.67.94 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 2022 proto: TCP cat: Misc Attack | 2020-01-24 06:13:41 | 
| 104.236.228.46 | attackspambots | $f2bV_matches | 2020-01-24 05:57:04 | 
| 62.150.51.201 | attack | Unauthorized connection attempt from IP address 62.150.51.201 on Port 445(SMB) | 2020-01-24 06:00:49 | 
| 91.187.48.138 | attackspam | DATE:2020-01-23 17:01:27, IP:91.187.48.138, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) | 2020-01-24 06:08:56 | 
| 212.26.245.166 | attackbotsspam | Unauthorized connection attempt from IP address 212.26.245.166 on Port 445(SMB) | 2020-01-24 06:32:44 | 
| 159.203.201.163 | attackspam | 01/23/2020-17:02:07.118881 159.203.201.163 Protocol: 6 ET DROP Dshield Block Listed Source group 1 | 2020-01-24 05:55:29 | 
| 185.40.4.94 | attackbotsspam | Port scan on 17 port(s): 139 300 555 810 1030 2226 2401 3221 7011 7790 8077 8081 8158 8335 11180 33382 55550 | 2020-01-24 06:25:00 |