City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.104.137.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;152.104.137.232.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 23:55:20 CST 2025
;; MSG SIZE  rcvd: 108
        232.137.104.152.in-addr.arpa domain name pointer static-ip-232-137-104-152.rev.dyxnet.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
232.137.104.152.in-addr.arpa	name = static-ip-232-137-104-152.rev.dyxnet.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 139.199.122.210 | attackspam | Feb 9 05:55:50 h1745522 sshd[21843]: Invalid user fsu from 139.199.122.210 port 39488 Feb 9 05:55:50 h1745522 sshd[21843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.122.210 Feb 9 05:55:50 h1745522 sshd[21843]: Invalid user fsu from 139.199.122.210 port 39488 Feb 9 05:55:52 h1745522 sshd[21843]: Failed password for invalid user fsu from 139.199.122.210 port 39488 ssh2 Feb 9 05:59:32 h1745522 sshd[22083]: Invalid user cdm from 139.199.122.210 port 34098 Feb 9 05:59:32 h1745522 sshd[22083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.122.210 Feb 9 05:59:32 h1745522 sshd[22083]: Invalid user cdm from 139.199.122.210 port 34098 Feb 9 05:59:34 h1745522 sshd[22083]: Failed password for invalid user cdm from 139.199.122.210 port 34098 ssh2 Feb 9 06:02:53 h1745522 sshd[22220]: Invalid user txw from 139.199.122.210 port 56920 ...  | 
                    2020-02-09 13:21:13 | 
| 222.186.173.183 | attack | Feb 9 06:19:37 *host* sshd\[6456\]: Unable to negotiate with 222.186.173.183 port 22466: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\] ...  | 
                    2020-02-09 13:24:01 | 
| 139.162.122.110 | attackbots | 2020-02-09T04:59:01.178185Z 45552ecb8cbc New connection: 139.162.122.110:48924 (172.17.0.5:2222) [session: 45552ecb8cbc] 2020-02-09T04:59:01.651797Z 3c203fdf7ed3 New connection: 139.162.122.110:49200 (172.17.0.5:2222) [session: 3c203fdf7ed3]  | 
                    2020-02-09 13:12:57 | 
| 111.30.31.176 | attackspambots | Brute force attempt  | 
                    2020-02-09 11:07:02 | 
| 103.67.218.11 | attack | Unauthorized connection attempt from IP address 103.67.218.11 on Port 445(SMB)  | 
                    2020-02-09 10:59:06 | 
| 118.25.250.156 | attackbotsspam | Feb 9 01:14:05 XXX sshd[63260]: Invalid user sql from 118.25.250.156 port 43346  | 
                    2020-02-09 10:47:33 | 
| 24.212.110.146 | attackbotsspam | Unauthorized connection attempt from IP address 24.212.110.146 on Port 445(SMB)  | 
                    2020-02-09 10:51:09 | 
| 1.171.50.231 | attack | port scan and connect, tcp 23 (telnet)  | 
                    2020-02-09 13:04:16 | 
| 222.186.175.212 | attackbotsspam | Feb 9 05:59:04 ns382633 sshd\[6368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212 user=root Feb 9 05:59:06 ns382633 sshd\[6368\]: Failed password for root from 222.186.175.212 port 29664 ssh2 Feb 9 05:59:10 ns382633 sshd\[6368\]: Failed password for root from 222.186.175.212 port 29664 ssh2 Feb 9 05:59:13 ns382633 sshd\[6368\]: Failed password for root from 222.186.175.212 port 29664 ssh2 Feb 9 05:59:16 ns382633 sshd\[6368\]: Failed password for root from 222.186.175.212 port 29664 ssh2  | 
                    2020-02-09 13:01:14 | 
| 187.109.221.38 | attackspambots | Unauthorized connection attempt from IP address 187.109.221.38 on Port 445(SMB)  | 
                    2020-02-09 11:04:16 | 
| 36.80.48.9 | attack | 2020-02-09T05:56:02.108455host3.slimhost.com.ua sshd[3503745]: Invalid user xnp from 36.80.48.9 port 39809 2020-02-09T05:56:02.113091host3.slimhost.com.ua sshd[3503745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.80.48.9 2020-02-09T05:56:02.108455host3.slimhost.com.ua sshd[3503745]: Invalid user xnp from 36.80.48.9 port 39809 2020-02-09T05:56:04.227171host3.slimhost.com.ua sshd[3503745]: Failed password for invalid user xnp from 36.80.48.9 port 39809 ssh2 2020-02-09T06:05:12.468268host3.slimhost.com.ua sshd[3514432]: Invalid user jfl from 36.80.48.9 port 7105 ...  | 
                    2020-02-09 13:08:35 | 
| 2.133.82.239 | attack | Unauthorized connection attempt from IP address 2.133.82.239 on Port 445(SMB)  | 
                    2020-02-09 11:08:05 | 
| 123.23.62.215 | attack | Automatic report - Port Scan Attack  | 
                    2020-02-09 10:50:11 | 
| 49.232.15.34 | attack | 404 NOT FOUND  | 
                    2020-02-09 11:05:15 | 
| 54.250.87.247 | attack | 54.250.87.247 - - \[09/Feb/2020:03:34:57 +0100\] "POST /wp-login.php HTTP/2.0" 200 1611 "-" "-"  | 
                    2020-02-09 10:48:21 |