City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.80.222.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.80.222.13.			IN	A
;; AUTHORITY SECTION:
.			117	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:21:26 CST 2022
;; MSG SIZE  rcvd: 106
        Host 13.222.80.145.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 13.222.80.145.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 161.35.148.75 | attackbotsspam | Invalid user user from 161.35.148.75 port 47978  | 
                    2020-09-25 01:43:09 | 
| 104.238.184.114 | attackbotsspam | Attempt to hack Wordpress Login, XMLRPC or other login  | 
                    2020-09-25 01:21:01 | 
| 188.22.0.63 | attack | Unauthorized connection attempt from IP address 188.22.0.63 on Port 445(SMB)  | 
                    2020-09-25 01:49:45 | 
| 190.66.3.92 | attackspam | Sep 24 19:06:17 vpn01 sshd[2090]: Failed password for root from 190.66.3.92 port 55994 ssh2 ...  | 
                    2020-09-25 01:42:36 | 
| 90.53.155.194 | attackbots | 20 attempts against mh-ssh on star  | 
                    2020-09-25 01:12:48 | 
| 115.99.231.40 | attack | Listed on zen-spamhaus also abuseat.org and dnsbl-sorbs / proto=6 . srcport=55280 . dstport=23 . (2872)  | 
                    2020-09-25 01:49:17 | 
| 60.190.159.42 | attackspambots | Unauthorized connection attempt from IP address 60.190.159.42 on Port 445(SMB)  | 
                    2020-09-25 01:13:11 | 
| 213.231.158.91 | attack | Sep 24 00:01:13 sip sshd[5874]: Failed password for root from 213.231.158.91 port 49254 ssh2 Sep 24 00:01:14 sip sshd[5943]: Failed password for root from 213.231.158.91 port 49362 ssh2  | 
                    2020-09-25 01:25:40 | 
| 71.45.233.98 | attackbotsspam | Invalid user akshay from 71.45.233.98 port 62184  | 
                    2020-09-25 01:30:12 | 
| 42.2.201.238 | attackspambots | Sep 23 14:01:35 logopedia-1vcpu-1gb-nyc1-01 sshd[126859]: Failed password for root from 42.2.201.238 port 52588 ssh2 ...  | 
                    2020-09-25 01:26:30 | 
| 65.49.20.96 | attackspam | 443/udp 22/tcp 22/tcp [2020-07-26/09-24]3pkt  | 
                    2020-09-25 01:19:28 | 
| 128.199.30.242 | attackspambots | Invalid user recepcion from 128.199.30.242 port 47510  | 
                    2020-09-25 01:22:43 | 
| 91.193.222.45 | attack | Listed on dnsbl-sorbs plus abuseat.org and barracudaCentral / proto=6 . srcport=58957 . dstport=8080 . (2874)  | 
                    2020-09-25 01:37:40 | 
| 1.64.251.59 | attack | Sep 23 07:01:22 sip sshd[24629]: Failed password for root from 1.64.251.59 port 45536 ssh2 Sep 23 22:01:57 sip sshd[6461]: Failed password for root from 1.64.251.59 port 50132 ssh2  | 
                    2020-09-25 01:15:43 | 
| 14.246.214.185 | attackbotsspam | Sep 23 14:01:35 logopedia-1vcpu-1gb-nyc1-01 sshd[126863]: Failed password for root from 14.246.214.185 port 54224 ssh2 ...  | 
                    2020-09-25 01:24:07 |