City: unknown
Region: unknown
Country: France
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.48.68.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;161.48.68.13.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:40:40 CST 2025
;; MSG SIZE  rcvd: 105Host 13.68.48.161.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53
** server can't find 13.68.48.161.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime | 
|---|---|---|---|
| 13.58.90.105 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): | 2020-09-25 05:00:46 | 
| 134.175.150.132 | attackbotsspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): | 2020-09-25 05:20:21 | 
| 138.97.23.190 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): | 2020-09-25 05:18:57 | 
| 222.180.208.14 | attack | SSH bruteforce attack | 2020-09-25 05:02:27 | 
| 180.97.182.111 | attackspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root | 2020-09-25 05:08:23 | 
| 103.21.116.249 | attackbots | Sep 24 21:21:10 hcbbdb sshd\[26262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.116.249 user=root Sep 24 21:21:12 hcbbdb sshd\[26262\]: Failed password for root from 103.21.116.249 port 55654 ssh2 Sep 24 21:24:49 hcbbdb sshd\[26585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.116.249 user=root Sep 24 21:24:51 hcbbdb sshd\[26585\]: Failed password for root from 103.21.116.249 port 54768 ssh2 Sep 24 21:28:27 hcbbdb sshd\[26928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.116.249 user=root | 2020-09-25 05:31:47 | 
| 138.197.12.179 | attackbots | Invalid user sysadmin from 138.197.12.179 port 34892 | 2020-09-25 05:18:35 | 
| 39.100.28.79 | attackspambots | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): | 2020-09-25 04:59:08 | 
| 134.209.235.129 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): | 2020-09-25 05:19:55 | 
| 201.122.212.15 | attackspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): | 2020-09-25 05:04:47 | 
| 132.232.77.85 | attack | Invalid user acct from 132.232.77.85 port 53966 | 2020-09-25 05:21:15 | 
| 121.63.176.13 | attackbotsspam | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root | 2020-09-25 05:24:03 | 
| 117.86.10.32 | attackspambots | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root | 2020-09-25 05:26:03 | 
| 101.32.41.101 | attackspam | Repeated brute force against a port | 2020-09-25 05:32:10 | 
| 128.199.123.220 | attackspambots | Time: Thu Sep 24 19:33:57 2020 +0000 IP: 128.199.123.220 (SG/Singapore/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 24 19:29:26 activeserver sshd[2393]: Invalid user scs from 128.199.123.220 port 54979 Sep 24 19:29:28 activeserver sshd[2393]: Failed password for invalid user scs from 128.199.123.220 port 54979 ssh2 Sep 24 19:32:18 activeserver sshd[12164]: Invalid user minecraft from 128.199.123.220 port 29732 Sep 24 19:32:20 activeserver sshd[12164]: Failed password for invalid user minecraft from 128.199.123.220 port 29732 ssh2 Sep 24 19:33:55 activeserver sshd[17564]: Invalid user ftptest from 128.199.123.220 port 61610 | 2020-09-25 05:21:45 |