City: unknown
Region: unknown
Country: France
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.143.207.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32216
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.143.207.38.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:21:13 CST 2025
;; MSG SIZE  rcvd: 107
        Host 38.207.143.148.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 38.207.143.148.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 93.115.250.24 | attack | 2019-04-22 15:36:35 1hIZ7a-0000Gw-RM SMTP connection from \(scissors.bersaathevents.icu\) \[93.115.250.24\]:33029 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-04-22 15:38:22 1hIZ9J-0000Jp-WA SMTP connection from \(scissors.bersaathevents.icu\) \[93.115.250.24\]:37360 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-04-22 15:38:49 1hIZ9k-0000KH-Ua SMTP connection from \(scissors.bersaathevents.icu\) \[93.115.250.24\]:60972 I=\[193.107.88.166\]:25 closed by DROP in ACL ...  | 
                    2020-01-28 04:05:20 | 
| 138.68.168.137 | attackspam | Dec 19 03:24:30 dallas01 sshd[28204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137 Dec 19 03:24:32 dallas01 sshd[28204]: Failed password for invalid user guenter from 138.68.168.137 port 60208 ssh2 Dec 19 03:29:37 dallas01 sshd[31708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137  | 
                    2020-01-28 04:14:22 | 
| 185.173.35.53 | attackspambots | Unauthorized connection attempt detected from IP address 185.173.35.53 to port 2323 [J]  | 
                    2020-01-28 04:17:42 | 
| 93.105.26.176 | attackspam | 2019-06-22 01:07:43 1heSdB-0003NC-Dv SMTP connection from 093105026176.suwalki.vectranet.pl \[93.105.26.176\]:15436 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 01:07:48 1heSdH-0003NI-1m SMTP connection from 093105026176.suwalki.vectranet.pl \[93.105.26.176\]:15504 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 01:07:52 1heSdL-0003NM-8F SMTP connection from 093105026176.suwalki.vectranet.pl \[93.105.26.176\]:15543 I=\[193.107.88.166\]:25 closed by DROP in ACL ...  | 
                    2020-01-28 04:30:08 | 
| 138.68.17.96 | attackspambots | Jul 24 10:49:19 dallas01 sshd[12320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.17.96 Jul 24 10:49:20 dallas01 sshd[12320]: Failed password for invalid user oracle from 138.68.17.96 port 51704 ssh2 Jul 24 10:53:47 dallas01 sshd[12889]: Failed password for root from 138.68.17.96 port 47246 ssh2  | 
                    2020-01-28 04:07:32 | 
| 112.164.146.83 | attack | Honeypot attack, port: 5555, PTR: PTR record not found  | 
                    2020-01-28 04:39:01 | 
| 93.102.53.235 | attackspam | 2020-01-26 04:36:45 1ivYj5-0004TO-5M SMTP connection from 93.102.53.235.rev.optimus.pt \[93.102.53.235\]:43125 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-26 04:37:15 1ivYja-0004UU-2w SMTP connection from 93.102.53.235.rev.optimus.pt \[93.102.53.235\]:43287 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-26 04:37:36 1ivYjt-0004VA-8n SMTP connection from 93.102.53.235.rev.optimus.pt \[93.102.53.235\]:43382 I=\[193.107.88.166\]:25 closed by DROP in ACL ...  | 
                    2020-01-28 04:34:13 | 
| 93.115.250.10 | attack | 2019-04-29 08:05:47 1hKzQB-00009D-AD SMTP connection from \(lovelly.milkray.icu\) \[93.115.250.10\]:35834 I=\[193.107.90.29\]:25 closed by DROP in ACL 2019-04-29 08:07:30 1hKzRq-0000BX-H7 SMTP connection from \(lovelly.milkray.icu\) \[93.115.250.10\]:59752 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-04-29 08:07:51 1hKzSB-0000Br-0y SMTP connection from \(lovelly.milkray.icu\) \[93.115.250.10\]:60079 I=\[193.107.88.166\]:25 closed by DROP in ACL ...  | 
                    2020-01-28 04:21:41 | 
| 179.43.149.16 | attackspambots | 53413/udp 53413/udp [2020-01-25]2pkt  | 
                    2020-01-28 04:28:44 | 
| 106.75.15.142 | attackbots | Jan 27 20:37:00 * sshd[4696]: Failed password for syslog from 106.75.15.142 port 60810 ssh2  | 
                    2020-01-28 04:23:49 | 
| 111.242.22.152 | attackbotsspam | 2323/tcp 23/tcp [2020-01-25/26]2pkt  | 
                    2020-01-28 04:19:33 | 
| 222.186.31.166 | attack | Jan 27 20:58:51 MK-Soft-VM4 sshd[12038]: Failed password for root from 222.186.31.166 port 60306 ssh2 Jan 27 20:58:54 MK-Soft-VM4 sshd[12038]: Failed password for root from 222.186.31.166 port 60306 ssh2 ...  | 
                    2020-01-28 04:00:41 | 
| 187.202.240.108 | attackbotsspam | 1580150187 - 01/27/2020 19:36:27 Host: 187.202.240.108/187.202.240.108 Port: 445 TCP Blocked  | 
                    2020-01-28 04:26:49 | 
| 121.46.29.116 | attackspam | Automatic report - Banned IP Access  | 
                    2020-01-28 04:12:35 | 
| 190.198.168.105 | attack | 20/1/27@13:36:39: FAIL: Alarm-Network address from=190.198.168.105 ...  | 
                    2020-01-28 04:05:37 |