City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.159.12.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.159.12.128.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030201 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 11:57:39 CST 2025
;; MSG SIZE  rcvd: 107Host 128.12.159.164.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 128.12.159.164.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 183.62.25.218 | attackspam | 2020-06-20T06:49:52.910836galaxy.wi.uni-potsdam.de sshd[28007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.25.218 2020-06-20T06:49:52.908507galaxy.wi.uni-potsdam.de sshd[28007]: Invalid user kasa from 183.62.25.218 port 10135 2020-06-20T06:49:54.303840galaxy.wi.uni-potsdam.de sshd[28007]: Failed password for invalid user kasa from 183.62.25.218 port 10135 ssh2 2020-06-20T06:51:19.718835galaxy.wi.uni-potsdam.de sshd[28195]: Invalid user laravel from 183.62.25.218 port 10136 2020-06-20T06:51:19.720862galaxy.wi.uni-potsdam.de sshd[28195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.25.218 2020-06-20T06:51:19.718835galaxy.wi.uni-potsdam.de sshd[28195]: Invalid user laravel from 183.62.25.218 port 10136 2020-06-20T06:51:22.058369galaxy.wi.uni-potsdam.de sshd[28195]: Failed password for invalid user laravel from 183.62.25.218 port 10136 ssh2 2020-06-20T06:52:50.320237galaxy.wi.uni-potsdam.d ... | 2020-06-20 16:30:54 | 
| 141.98.10.200 | attackspam | " " | 2020-06-20 16:31:57 | 
| 139.199.32.22 | attackspambots | 2020-06-20T10:06:49.239064vps751288.ovh.net sshd\[20290\]: Invalid user ftpuser2 from 139.199.32.22 port 34400 2020-06-20T10:06:49.247089vps751288.ovh.net sshd\[20290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.32.22 2020-06-20T10:06:50.906790vps751288.ovh.net sshd\[20290\]: Failed password for invalid user ftpuser2 from 139.199.32.22 port 34400 ssh2 2020-06-20T10:09:44.087327vps751288.ovh.net sshd\[20314\]: Invalid user copy from 139.199.32.22 port 36732 2020-06-20T10:09:44.096504vps751288.ovh.net sshd\[20314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.32.22 | 2020-06-20 16:28:03 | 
| 179.110.213.232 | attackspambots | port scan and connect, tcp 8080 (http-proxy) | 2020-06-20 16:13:54 | 
| 196.223.170.202 | attackspam | 20/6/19@23:50:43: FAIL: Alarm-Network address from=196.223.170.202 ... | 2020-06-20 16:12:53 | 
| 59.120.227.134 | attackbotsspam | Jun 20 08:50:52 gw1 sshd[8364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.227.134 Jun 20 08:50:54 gw1 sshd[8364]: Failed password for invalid user jack from 59.120.227.134 port 56480 ssh2 ... | 2020-06-20 16:08:35 | 
| 187.154.165.138 | attackspam | 1592625060 - 06/20/2020 05:51:00 Host: 187.154.165.138/187.154.165.138 Port: 445 TCP Blocked | 2020-06-20 16:05:47 | 
| 166.175.184.82 | attackspam | Brute forcing email accounts | 2020-06-20 16:11:35 | 
| 209.126.124.203 | attackbotsspam | Invalid user mysqld from 209.126.124.203 port 57538 | 2020-06-20 16:27:30 | 
| 163.172.93.131 | attackbots | fail2ban -- 163.172.93.131 ... | 2020-06-20 16:21:17 | 
| 85.43.41.197 | attackspam | 2020-06-20T01:48:40.628032linuxbox-skyline sshd[23389]: Invalid user admin from 85.43.41.197 port 60450 ... | 2020-06-20 16:27:10 | 
| 185.237.85.21 | attack | xmlrpc attack | 2020-06-20 16:40:16 | 
| 185.153.196.126 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 3389 proto: TCP cat: Misc Attack | 2020-06-20 16:35:54 | 
| 194.26.25.11 | attackspambots | 
 | 2020-06-20 16:02:49 | 
| 49.232.135.102 | attack | SSH authentication failure x 6 reported by Fail2Ban ... | 2020-06-20 15:58:54 |