City: unknown
Region: unknown
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.219.134.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.219.134.209.		IN	A
;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 12:39:37 CST 2022
;; MSG SIZE  rcvd: 108Host 209.134.219.169.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 209.134.219.169.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 210.211.116.114 | attack | Invalid user admin from 210.211.116.114 port 32978 | 2020-01-10 22:51:41 | 
| 197.156.112.232 | attackspambots | Jan 10 14:37:52 vmd17057 sshd\[16825\]: Invalid user admin from 197.156.112.232 port 62904 Jan 10 14:37:52 vmd17057 sshd\[16825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.156.112.232 Jan 10 14:37:54 vmd17057 sshd\[16825\]: Failed password for invalid user admin from 197.156.112.232 port 62904 ssh2 ... | 2020-01-10 22:24:47 | 
| 211.142.118.38 | attackbotsspam | Invalid user munin from 211.142.118.38 port 49073 | 2020-01-10 22:21:19 | 
| 45.186.182.252 | attack | Invalid user admin from 45.186.182.252 port 41269 | 2020-01-10 22:47:14 | 
| 193.188.22.229 | attack | Jan 10 09:20:24 server sshd\[25551\]: Failed password for root from 193.188.22.229 port 35082 ssh2 Jan 10 17:06:49 server sshd\[12621\]: Invalid user Administrator from 193.188.22.229 Jan 10 17:06:49 server sshd\[12621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.229 Jan 10 17:06:51 server sshd\[12621\]: Failed password for invalid user Administrator from 193.188.22.229 port 41988 ssh2 Jan 10 17:06:51 server sshd\[12630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.229 user=root ... | 2020-01-10 22:25:16 | 
| 94.182.191.45 | attack | Jan 6 17:26:28 myhostname sshd[16685]: Invalid user jira1 from 94.182.191.45 Jan 6 17:26:28 myhostname sshd[16685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.191.45 Jan 6 17:26:30 myhostname sshd[16685]: Failed password for invalid user jira1 from 94.182.191.45 port 46020 ssh2 Jan 6 17:26:30 myhostname sshd[16685]: Received disconnect from 94.182.191.45 port 46020:11: Bye Bye [preauth] Jan 6 17:26:30 myhostname sshd[16685]: Disconnected from 94.182.191.45 port 46020 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=94.182.191.45 | 2020-01-10 22:41:21 | 
| 37.186.38.250 | attackspambots | Invalid user pi from 37.186.38.250 port 7786 | 2020-01-10 22:48:23 | 
| 49.232.162.53 | attackspambots | Invalid user jana from 49.232.162.53 port 50756 | 2020-01-10 22:46:43 | 
| 139.59.78.236 | attackbotsspam | Invalid user amber from 139.59.78.236 port 34134 | 2020-01-10 22:30:56 | 
| 202.151.30.145 | attackspambots | Invalid user runa from 202.151.30.145 port 54738 | 2020-01-10 22:53:15 | 
| 139.99.221.61 | attackbotsspam | Invalid user tomek from 139.99.221.61 port 57996 | 2020-01-10 22:30:27 | 
| 107.170.249.6 | attackspam | Invalid user ocadmin from 107.170.249.6 port 39037 | 2020-01-10 22:38:27 | 
| 104.178.162.203 | attackspam | unauthorized connection attempt | 2020-01-10 22:39:45 | 
| 129.204.11.222 | attackspam | Invalid user vo from 129.204.11.222 port 53886 | 2020-01-10 22:32:17 | 
| 206.189.72.217 | attackspam | Invalid user sp from 206.189.72.217 port 38342 | 2020-01-10 22:23:33 |