City: unknown
Region: unknown
Country: Ecuador
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.100.216.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;157.100.216.82.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 10:54:01 CST 2025
;; MSG SIZE  rcvd: 107
        82.216.100.157.in-addr.arpa domain name pointer host-157-100-216-82.ecua.net.ec.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
82.216.100.157.in-addr.arpa	name = host-157-100-216-82.ecua.net.ec.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 185.216.140.185 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 5900 proto: TCP cat: Misc Attack  | 
                    2020-01-22 04:04:21 | 
| 80.211.63.23 | attackspam | 80.211.63.23 - - [21/Jan/2020:18:12:19 +0300] "POST /wp-login.php HTTP/1.1" 200 2568 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2020-01-22 03:55:33 | 
| 54.37.21.211 | attackspam | fail2ban honeypot  | 
                    2020-01-22 03:52:59 | 
| 144.76.4.41 | attackspam | 20 attempts against mh-misbehave-ban on plane.magehost.pro  | 
                    2020-01-22 04:03:42 | 
| 200.133.39.24 | attackspambots | Jan 21 20:51:49 163-172-32-151 sshd[13647]: Invalid user two from 200.133.39.24 port 55812 ...  | 
                    2020-01-22 04:04:06 | 
| 110.49.73.51 | attackbots | Jan 21 14:21:44 reporting6 sshd[23418]: Invalid user rodrigo from 110.49.73.51 Jan 21 14:21:44 reporting6 sshd[23418]: Failed password for invalid user rodrigo from 110.49.73.51 port 36142 ssh2 Jan 21 14:27:55 reporting6 sshd[25949]: Invalid user gt from 110.49.73.51 Jan 21 14:27:55 reporting6 sshd[25949]: Failed password for invalid user gt from 110.49.73.51 port 50710 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=110.49.73.51  | 
                    2020-01-22 03:40:42 | 
| 119.200.89.74 | attackbotsspam | Unauthorized connection attempt detected from IP address 119.200.89.74 to port 2220 [J]  | 
                    2020-01-22 03:36:12 | 
| 179.185.137.145 | attackbots | Unauthorized connection attempt detected from IP address 179.185.137.145 to port 23 [J]  | 
                    2020-01-22 03:48:56 | 
| 83.31.89.129 | attackbots | Invalid user ad from 83.31.89.129 port 35437  | 
                    2020-01-22 03:30:52 | 
| 204.48.19.178 | attackspam | SSH Login Bruteforce  | 
                    2020-01-22 03:38:05 | 
| 103.143.32.26 | attack | DNS Flooding  | 
                    2020-01-22 03:40:15 | 
| 45.224.105.135 | attack | (imapd) Failed IMAP login from 45.224.105.135 (AR/Argentina/-): 1 in the last 3600 secs  | 
                    2020-01-22 03:38:31 | 
| 125.27.106.189 | attackspam | Jan 21 20:44:19 dcd-gentoo sshd[20424]: Invalid user stats from 125.27.106.189 port 55932 Jan 21 20:44:21 dcd-gentoo sshd[20431]: Invalid user stats from 125.27.106.189 port 56219 Jan 21 20:44:22 dcd-gentoo sshd[20434]: Invalid user stats from 125.27.106.189 port 56337 ...  | 
                    2020-01-22 03:50:36 | 
| 187.162.24.215 | attackbots | fraudulent SSH attempt  | 
                    2020-01-22 03:58:55 | 
| 218.92.0.203 | attack | Jan 21 20:13:10 MK-Soft-Root1 sshd[7111]: Failed password for root from 218.92.0.203 port 13816 ssh2 Jan 21 20:13:13 MK-Soft-Root1 sshd[7111]: Failed password for root from 218.92.0.203 port 13816 ssh2 ...  | 
                    2020-01-22 03:56:48 |