City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.235.42.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11631
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.235.42.212.			IN	A
;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:31:43 CST 2022
;; MSG SIZE  rcvd: 107b'Host 212.42.235.164.in-addr.arpa. not found: 3(NXDOMAIN)
'server can't find 164.235.42.212.in-addr.arpa: SERVFAIL| IP | Type | Details | Datetime | 
|---|---|---|---|
| 189.135.128.129 | attack | Invalid user andrew from 189.135.128.129 port 37902 | 2020-01-19 00:51:18 | 
| 220.120.106.254 | attack | Unauthorized connection attempt detected from IP address 220.120.106.254 to port 2220 [J] | 2020-01-19 00:48:04 | 
| 91.79.28.79 | attackbotsspam | failed_logins | 2020-01-19 01:15:06 | 
| 122.152.195.84 | attackspam | Unauthorized connection attempt detected from IP address 122.152.195.84 to port 2220 [J] | 2020-01-19 01:05:54 | 
| 159.203.74.227 | attackbots | $f2bV_matches | 2020-01-19 00:58:52 | 
| 132.232.113.102 | attack | Unauthorized connection attempt detected from IP address 132.232.113.102 to port 2220 [J] | 2020-01-19 01:03:20 | 
| 71.79.147.111 | attack | Jan 18 06:02:09 hpm sshd\[21330\]: Invalid user steven from 71.79.147.111 Jan 18 06:02:09 hpm sshd\[21330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-71-79-147-111.neo.res.rr.com Jan 18 06:02:12 hpm sshd\[21330\]: Failed password for invalid user steven from 71.79.147.111 port 59730 ssh2 Jan 18 06:10:04 hpm sshd\[22044\]: Invalid user worker1 from 71.79.147.111 Jan 18 06:10:04 hpm sshd\[22044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-71-79-147-111.neo.res.rr.com | 2020-01-19 00:43:32 | 
| 129.211.147.123 | attackspambots | Jan 18 15:07:32 | 2020-01-19 01:03:57 | 
| 171.34.173.49 | attackspam | Unauthorized connection attempt detected from IP address 171.34.173.49 to port 2220 [J] | 2020-01-19 00:57:29 | 
| 115.165.166.193 | attackbots | no | 2020-01-19 01:06:48 | 
| 80.178.115.146 | attackbots | Unauthorized connection attempt detected from IP address 80.178.115.146 to port 2220 [J] | 2020-01-19 01:16:23 | 
| 104.248.169.127 | attack | Invalid user credito from 104.248.169.127 port 51786 | 2020-01-19 00:38:43 | 
| 223.100.63.187 | attack | Invalid user admin from 223.100.63.187 port 4254 | 2020-01-19 00:47:05 | 
| 106.12.33.181 | attackbotsspam | Jan 18 16:28:39 lnxded63 sshd[11325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.181 | 2020-01-19 00:38:19 | 
| 88.26.231.224 | attackbotsspam | leo_www | 2020-01-19 01:15:25 |