City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.196.106.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50498
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.196.106.200.		IN	A
;; AUTHORITY SECTION:
.			461	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:50:56 CST 2022
;; MSG SIZE  rcvd: 108
        Host 200.106.196.169.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 200.106.196.169.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 83.175.213.250 | attack | Dec 25 19:45:40 plusreed sshd[9868]: Invalid user drivers from 83.175.213.250 ...  | 
                    2019-12-26 09:21:46 | 
| 142.93.107.152 | attackbots | Dec 26 01:21:37 dedicated sshd[32297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.107.152 user=bin Dec 26 01:21:38 dedicated sshd[32297]: Failed password for bin from 142.93.107.152 port 60720 ssh2  | 
                    2019-12-26 09:12:28 | 
| 202.15.17.2 | attack | Dec 26 05:35:54 gw1 sshd[13006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.15.17.2 ...  | 
                    2019-12-26 09:16:22 | 
| 177.99.197.111 | attack | no  | 
                    2019-12-26 09:05:47 | 
| 210.210.116.203 | attack | CloudCIX Reconnaissance Scan Detected, PTR: 210-210-116-203.lan.sify.net.  | 
                    2019-12-26 09:01:22 | 
| 104.131.84.103 | attackspam | Dec 26 01:10:14 legacy sshd[22029]: Failed password for daemon from 104.131.84.103 port 35410 ssh2 Dec 26 01:12:29 legacy sshd[22131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.84.103 Dec 26 01:12:31 legacy sshd[22131]: Failed password for invalid user lavoy from 104.131.84.103 port 45435 ssh2 ...  | 
                    2019-12-26 08:42:40 | 
| 176.31.250.171 | attackbots | $f2bV_matches  | 
                    2019-12-26 08:52:13 | 
| 43.248.187.45 | attackspam | 2019-12-26T00:19:13.166457abusebot-8.cloudsearch.cf sshd[21695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.187.45 user=root 2019-12-26T00:19:15.137978abusebot-8.cloudsearch.cf sshd[21695]: Failed password for root from 43.248.187.45 port 55363 ssh2 2019-12-26T00:19:17.135033abusebot-8.cloudsearch.cf sshd[21697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.187.45 user=root 2019-12-26T00:19:18.654818abusebot-8.cloudsearch.cf sshd[21697]: Failed password for root from 43.248.187.45 port 57051 ssh2 2019-12-26T00:19:20.686645abusebot-8.cloudsearch.cf sshd[21700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.187.45 user=root 2019-12-26T00:19:22.953892abusebot-8.cloudsearch.cf sshd[21700]: Failed password for root from 43.248.187.45 port 58649 ssh2 2019-12-26T00:19:25.014455abusebot-8.cloudsearch.cf sshd[21702]: pam_unix(sshd:auth): authe ...  | 
                    2019-12-26 08:42:59 | 
| 101.91.160.243 | attack | Invalid user smmsp from 101.91.160.243 port 41536  | 
                    2019-12-26 08:46:00 | 
| 187.214.158.158 | attackbots | 1577314274 - 12/25/2019 23:51:14 Host: 187.214.158.158/187.214.158.158 Port: 445 TCP Blocked  | 
                    2019-12-26 09:16:53 | 
| 59.153.74.43 | attackspambots | Dec 25 09:49:24 : SSH login attempts with invalid user  | 
                    2019-12-26 09:21:02 | 
| 182.18.139.201 | attackbotsspam | Invalid user myrvang from 182.18.139.201 port 54198  | 
                    2019-12-26 08:50:44 | 
| 106.13.98.119 | attack | Dec 25 19:17:13 plusreed sshd[2555]: Invalid user fukui from 106.13.98.119 ...  | 
                    2019-12-26 09:01:49 | 
| 218.92.0.184 | attack | SSH-BruteForce  | 
                    2019-12-26 08:58:48 | 
| 183.80.119.1 | attackspam | scan z  | 
                    2019-12-26 09:19:44 |