City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.164.205.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;166.164.205.104.		IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 167 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:11:03 CST 2025
;; MSG SIZE  rcvd: 108
        104.205.164.166.in-addr.arpa domain name pointer 104.sub-166-164-205.myvzw.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
104.205.164.166.in-addr.arpa	name = 104.sub-166-164-205.myvzw.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 194.26.29.148 | attack | SmallBizIT.US 7 packets to tcp(31216,31263,31417,31689,31776,31901,31945)  | 
                    2020-08-02 12:37:20 | 
| 167.172.38.238 | attackbotsspam | srv02 Mass scanning activity detected Target: 1368 ..  | 
                    2020-08-02 13:03:18 | 
| 185.143.221.46 | attackspambots | Fail2Ban Ban Triggered  | 
                    2020-08-02 12:39:57 | 
| 51.15.126.127 | attack | $f2bV_matches  | 
                    2020-08-02 13:06:20 | 
| 5.3.6.82 | attackbotsspam | Aug 2 04:34:59 hcbbdb sshd\[4942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82 user=root Aug 2 04:35:01 hcbbdb sshd\[4942\]: Failed password for root from 5.3.6.82 port 39838 ssh2 Aug 2 04:36:38 hcbbdb sshd\[5117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82 user=root Aug 2 04:36:41 hcbbdb sshd\[5117\]: Failed password for root from 5.3.6.82 port 42498 ssh2 Aug 2 04:38:16 hcbbdb sshd\[5298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82 user=root  | 
                    2020-08-02 12:54:28 | 
| 88.116.119.140 | attackspam | Invalid user prerit from 88.116.119.140 port 54874  | 
                    2020-08-02 12:54:56 | 
| 51.91.123.119 | attackspambots | Aug 2 06:25:22 mout sshd[25218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.123.119 user=root Aug 2 06:25:24 mout sshd[25218]: Failed password for root from 51.91.123.119 port 43152 ssh2  | 
                    2020-08-02 12:59:15 | 
| 116.196.90.116 | attackbotsspam | Invalid user yli from 116.196.90.116 port 52612  | 
                    2020-08-02 13:00:37 | 
| 163.172.157.193 | attackbotsspam | *Port Scan* detected from 163.172.157.193 (FR/France/Île-de-France/Paris/193-157-172-163.instances.scw.cloud). 4 hits in the last 210 seconds  | 
                    2020-08-02 13:04:23 | 
| 93.174.89.55 | attackbotsspam | *Port Scan* detected from 93.174.89.55 (NL/Netherlands/North Holland/Amsterdam/no-reverse-dns-configured.com). 4 hits in the last 240 seconds  | 
                    2020-08-02 12:50:41 | 
| 14.245.80.134 | attack | 1596340516 - 08/02/2020 05:55:16 Host: 14.245.80.134/14.245.80.134 Port: 445 TCP Blocked  | 
                    2020-08-02 12:47:49 | 
| 61.133.232.250 | attackbotsspam | Aug 2 05:49:37 eventyay sshd[20774]: Failed password for root from 61.133.232.250 port 2483 ssh2 Aug 2 05:51:23 eventyay sshd[20839]: Failed password for root from 61.133.232.250 port 41757 ssh2 ...  | 
                    2020-08-02 12:55:15 | 
| 146.88.240.4 | attackbotsspam | 146.88.240.4 was recorded 29 times by 4 hosts attempting to connect to the following ports: 5683,623,1604,5353,1434,1701,123,1194,17,27970,520,5093. Incident counter (4h, 24h, all-time): 29, 73, 83391  | 
                    2020-08-02 13:01:38 | 
| 139.155.43.222 | attackbotsspam | Aug 2 06:22:45 vps sshd[857687]: Failed password for root from 139.155.43.222 port 51904 ssh2 Aug 2 06:23:37 vps sshd[861116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.43.222 user=root Aug 2 06:23:39 vps sshd[861116]: Failed password for root from 139.155.43.222 port 33322 ssh2 Aug 2 06:24:32 vps sshd[864518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.43.222 user=root Aug 2 06:24:35 vps sshd[864518]: Failed password for root from 139.155.43.222 port 43052 ssh2 ...  | 
                    2020-08-02 12:40:41 | 
| 45.136.7.46 | attackbots | From admit@relativebet.xyz Sat Aug 01 20:55:13 2020 Received: from [45.136.7.46] (port=23662 helo=relativebet.xyz)  | 
                    2020-08-02 12:45:08 |