City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.141.18.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;161.141.18.168.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 22:23:54 CST 2025
;; MSG SIZE  rcvd: 107Host 168.18.141.161.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 168.18.141.161.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 50.209.145.30 | attackbotsspam | Oct 16 06:16:05 dev0-dcde-rnet sshd[11398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.145.30 Oct 16 06:16:07 dev0-dcde-rnet sshd[11398]: Failed password for invalid user cga from 50.209.145.30 port 40220 ssh2 Oct 16 06:20:26 dev0-dcde-rnet sshd[11414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.145.30 | 2019-10-16 12:39:42 | 
| 187.28.50.230 | attackbotsspam | Oct 16 06:31:18 sso sshd[31586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.28.50.230 Oct 16 06:31:20 sso sshd[31586]: Failed password for invalid user samp from 187.28.50.230 port 34377 ssh2 ... | 2019-10-16 12:41:15 | 
| 222.186.175.212 | attackspambots | Oct 16 11:55:34 lcl-usvr-02 sshd[20653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212 user=root Oct 16 11:55:36 lcl-usvr-02 sshd[20653]: Failed password for root from 222.186.175.212 port 63506 ssh2 Oct 16 11:55:40 lcl-usvr-02 sshd[20653]: Failed password for root from 222.186.175.212 port 63506 ssh2 Oct 16 11:55:34 lcl-usvr-02 sshd[20653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212 user=root Oct 16 11:55:36 lcl-usvr-02 sshd[20653]: Failed password for root from 222.186.175.212 port 63506 ssh2 Oct 16 11:55:40 lcl-usvr-02 sshd[20653]: Failed password for root from 222.186.175.212 port 63506 ssh2 ... | 2019-10-16 13:03:14 | 
| 178.249.187.222 | attack | Automatic report - XMLRPC Attack | 2019-10-16 12:59:53 | 
| 117.102.75.62 | attackbotsspam | Unauthorized connection attempt from IP address 117.102.75.62 on Port 445(SMB) | 2019-10-16 12:52:56 | 
| 14.248.80.75 | attack | Unauthorized connection attempt from IP address 14.248.80.75 on Port 445(SMB) | 2019-10-16 12:43:24 | 
| 163.172.13.168 | attackbots | Jul 31 10:12:48 vtv3 sshd\[21946\]: Invalid user andrei from 163.172.13.168 port 36588 Jul 31 10:12:48 vtv3 sshd\[21946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.13.168 Jul 31 10:12:50 vtv3 sshd\[21946\]: Failed password for invalid user andrei from 163.172.13.168 port 36588 ssh2 Jul 31 10:16:46 vtv3 sshd\[23944\]: Invalid user sit from 163.172.13.168 port 45972 Jul 31 10:16:46 vtv3 sshd\[23944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.13.168 Jul 31 10:30:37 vtv3 sshd\[31034\]: Invalid user undernet from 163.172.13.168 port 51854 Jul 31 10:30:37 vtv3 sshd\[31034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.13.168 Jul 31 10:30:39 vtv3 sshd\[31034\]: Failed password for invalid user undernet from 163.172.13.168 port 51854 ssh2 Jul 31 10:34:41 vtv3 sshd\[388\]: Invalid user liz from 163.172.13.168 port 33096 Jul 31 10:34:41 vtv3 sshd\[388 | 2019-10-16 13:03:47 | 
| 192.115.165.3 | attack | ET DROP Dshield Block Listed Source group 1 - port: 1094 proto: TCP cat: Misc Attack | 2019-10-16 12:56:09 | 
| 148.70.76.34 | attack | Oct 15 18:15:56 php1 sshd\[13434\]: Invalid user auser from 148.70.76.34 Oct 15 18:15:56 php1 sshd\[13434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.76.34 Oct 15 18:15:59 php1 sshd\[13434\]: Failed password for invalid user auser from 148.70.76.34 port 60860 ssh2 Oct 15 18:21:24 php1 sshd\[14043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.76.34 user=root Oct 15 18:21:26 php1 sshd\[14043\]: Failed password for root from 148.70.76.34 port 42600 ssh2 | 2019-10-16 12:34:03 | 
| 198.199.88.45 | attack | Oct 16 07:13:19 www sshd\[9180\]: Failed password for root from 198.199.88.45 port 52726 ssh2Oct 16 07:16:54 www sshd\[9195\]: Invalid user jzapata from 198.199.88.45Oct 16 07:16:55 www sshd\[9195\]: Failed password for invalid user jzapata from 198.199.88.45 port 35964 ssh2 ... | 2019-10-16 12:33:05 | 
| 1.54.196.254 | attackspam | Unauthorized connection attempt from IP address 1.54.196.254 on Port 445(SMB) | 2019-10-16 12:58:43 | 
| 66.146.193.33 | attackbotsspam | 10/16/2019-05:31:13.643698 66.146.193.33 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 77 | 2019-10-16 12:38:08 | 
| 159.192.96.182 | attackbotsspam | Unauthorized connection attempt from IP address 159.192.96.182 on Port 445(SMB) | 2019-10-16 12:35:16 | 
| 41.77.146.98 | attackbotsspam | Automatic report - Banned IP Access | 2019-10-16 12:36:03 | 
| 150.249.114.20 | attackbots | Oct 15 18:32:13 kapalua sshd\[20012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fp96f97214.tkyc210.ap.nuro.jp user=root Oct 15 18:32:15 kapalua sshd\[20012\]: Failed password for root from 150.249.114.20 port 34680 ssh2 Oct 15 18:36:02 kapalua sshd\[20320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fp96f97214.tkyc210.ap.nuro.jp user=root Oct 15 18:36:04 kapalua sshd\[20320\]: Failed password for root from 150.249.114.20 port 45600 ssh2 Oct 15 18:39:58 kapalua sshd\[20764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fp96f97214.tkyc210.ap.nuro.jp user=root | 2019-10-16 12:54:45 |