City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.65.104.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.65.104.71.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:36:35 CST 2025
;; MSG SIZE  rcvd: 106
        Host 71.104.65.141.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 71.104.65.141.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 171.220.242.90 | attack | $f2bV_matches  | 
                    2020-05-26 12:36:00 | 
| 106.12.204.75 | attackspam | May 26 03:12:56 eventyay sshd[18004]: Failed password for root from 106.12.204.75 port 38934 ssh2 May 26 03:15:59 eventyay sshd[18122]: Failed password for root from 106.12.204.75 port 55372 ssh2 May 26 03:19:05 eventyay sshd[18210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.204.75 ...  | 
                    2020-05-26 12:57:03 | 
| 51.83.129.158 | attackbotsspam | SSH invalid-user multiple login try  | 
                    2020-05-26 13:08:23 | 
| 121.7.127.92 | attack | May 26 03:09:24 host sshd[19752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=bb121-7-127-92.singnet.com.sg user=root May 26 03:09:26 host sshd[19752]: Failed password for root from 121.7.127.92 port 59107 ssh2 ...  | 
                    2020-05-26 12:58:02 | 
| 114.86.176.151 | attack | May 26 01:23:08 ArkNodeAT sshd\[4304\]: Invalid user sysbackup from 114.86.176.151 May 26 01:23:08 ArkNodeAT sshd\[4304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.86.176.151 May 26 01:23:10 ArkNodeAT sshd\[4304\]: Failed password for invalid user sysbackup from 114.86.176.151 port 57768 ssh2  | 
                    2020-05-26 12:29:12 | 
| 111.229.167.91 | attackspam | SSH login attempts.  | 
                    2020-05-26 13:02:23 | 
| 200.149.231.50 | attackbotsspam | leo_www  | 
                    2020-05-26 12:34:23 | 
| 91.223.20.199 | attackbotsspam | Invalid user testpc from 91.223.20.199 port 39732  | 
                    2020-05-26 12:37:37 | 
| 240e:d9:d800:200::d4 | attackbotsspam | TCP ports : 2087 / 8500  | 
                    2020-05-26 12:58:37 | 
| 178.173.143.20 | attackspambots | (smtpauth) Failed SMTP AUTH login from 178.173.143.20 (IR/Iran/hamyar-178-173-143-20.shirazhamyar.ir): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-26 03:52:49 plain authenticator failed for ([178.173.143.20]) [178.173.143.20]: 535 Incorrect authentication data (set_id=k.sheikhan@safanicu.com)  | 
                    2020-05-26 12:40:18 | 
| 116.85.40.181 | attackbots | Repeated brute force against a port  | 
                    2020-05-26 12:56:15 | 
| 59.127.1.12 | attack | Tried sshing with brute force.  | 
                    2020-05-26 12:48:02 | 
| 118.98.121.194 | attackspambots | May 25 08:35:29 XXX sshd[31552]: Invalid user malis from 118.98.121.194 port 55656  | 
                    2020-05-26 13:03:14 | 
| 37.49.226.248 | attackbotsspam | 
  | 
                    2020-05-26 12:54:02 | 
| 201.124.58.156 | attack | May 25 20:46:25 estefan sshd[9887]: reveeclipse mapping checking getaddrinfo for dsl-201-124-58-156-dyn.prod-infinhostnameum.com.mx [201.124.58.156] failed - POSSIBLE BREAK-IN ATTEMPT! May 25 20:46:25 estefan sshd[9887]: Invalid user ssh from 201.124.58.156 May 25 20:46:25 estefan sshd[9887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.124.58.156 May 25 20:46:27 estefan sshd[9887]: Failed password for invalid user ssh from 201.124.58.156 port 34407 ssh2 May 25 20:46:27 estefan sshd[9888]: Received disconnect from 201.124.58.156: 11: Bye Bye May 25 20:50:26 estefan sshd[9948]: reveeclipse mapping checking getaddrinfo for dsl-201-124-58-156-dyn.prod-infinhostnameum.com.mx [201.124.58.156] failed - POSSIBLE BREAK-IN ATTEMPT! May 25 20:50:26 estefan sshd[9948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.124.58.156 user=r.r May 25 20:50:29 estefan sshd[9948]: Failed password fo........ -------------------------------  | 
                    2020-05-26 12:28:04 |