City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.228.1.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.228.1.196.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 06:53:29 CST 2025
;; MSG SIZE  rcvd: 106196.1.228.140.in-addr.arpa domain name pointer vlan-1-196.onu.edu.
Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
196.1.228.140.in-addr.arpa	name = vlan-1-196.onu.edu.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 183.80.57.245 | attack | slow and persistent scanner | 2019-12-14 00:35:30 | 
| 91.204.250.59 | attackbots | 8080/tcp [2019-12-13]1pkt | 2019-12-14 00:31:54 | 
| 104.168.44.143 | attackspam | Dec 13 11:33:12 ny01 sshd[31066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.44.143 Dec 13 11:33:14 ny01 sshd[31066]: Failed password for invalid user newsletter from 104.168.44.143 port 43130 ssh2 Dec 13 11:39:50 ny01 sshd[31739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.44.143 | 2019-12-14 00:46:02 | 
| 94.158.83.31 | attackspam | Dec 13 16:21:41 XXX sshd[40774]: Invalid user pcap from 94.158.83.31 port 53146 | 2019-12-14 00:19:47 | 
| 74.207.232.191 | attack | 44818/tcp [2019-12-13]1pkt | 2019-12-14 00:24:28 | 
| 188.254.94.210 | attackspambots | 445/tcp [2019-12-13]1pkt | 2019-12-14 00:25:49 | 
| 112.85.42.171 | attackspambots | Dec 13 17:17:56 MK-Soft-VM8 sshd[8207]: Failed password for root from 112.85.42.171 port 40885 ssh2 Dec 13 17:18:01 MK-Soft-VM8 sshd[8207]: Failed password for root from 112.85.42.171 port 40885 ssh2 ... | 2019-12-14 00:31:10 | 
| 220.130.10.13 | attackspambots | Dec 13 16:11:40 web8 sshd\[25048\]: Invalid user guest from 220.130.10.13 Dec 13 16:11:40 web8 sshd\[25048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13 Dec 13 16:11:42 web8 sshd\[25048\]: Failed password for invalid user guest from 220.130.10.13 port 45983 ssh2 Dec 13 16:17:41 web8 sshd\[27972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13 user=root Dec 13 16:17:43 web8 sshd\[27972\]: Failed password for root from 220.130.10.13 port 53044 ssh2 | 2019-12-14 00:33:12 | 
| 129.146.147.62 | attack | 2019-12-13T15:52:18.600073abusebot.cloudsearch.cf sshd\[6032\]: Invalid user jdk300 from 129.146.147.62 port 53014 2019-12-13T15:52:18.606851abusebot.cloudsearch.cf sshd\[6032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.147.62 2019-12-13T15:52:20.212227abusebot.cloudsearch.cf sshd\[6032\]: Failed password for invalid user jdk300 from 129.146.147.62 port 53014 ssh2 2019-12-13T15:59:23.901263abusebot.cloudsearch.cf sshd\[6126\]: Invalid user uucp from 129.146.147.62 port 45884 | 2019-12-14 00:57:55 | 
| 190.39.51.252 | attackbots | 445/tcp 445/tcp 445/tcp [2019-12-13]3pkt | 2019-12-14 00:49:14 | 
| 91.226.190.81 | attackbots | Unauthorized connection attempt detected from IP address 91.226.190.81 to port 445 | 2019-12-14 00:45:29 | 
| 81.183.166.219 | attackspambots | Automatic report - Port Scan Attack | 2019-12-14 00:37:47 | 
| 45.42.91.237 | attackbots | 1433/tcp [2019-12-13]1pkt | 2019-12-14 00:58:38 | 
| 160.20.253.41 | attack | 1433/tcp [2019-12-13]1pkt | 2019-12-14 00:27:13 | 
| 193.188.22.188 | attackspambots | 2019-12-13T16:11:02.660984shield sshd\[14649\]: Invalid user admin from 193.188.22.188 port 43391 2019-12-13T16:11:02.741710shield sshd\[14649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.188 2019-12-13T16:11:04.321486shield sshd\[14649\]: Failed password for invalid user admin from 193.188.22.188 port 43391 ssh2 2019-12-13T16:11:04.980089shield sshd\[14664\]: Invalid user kernel from 193.188.22.188 port 46301 2019-12-13T16:11:05.055767shield sshd\[14664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.188 | 2019-12-14 00:19:03 |