City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.103.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.103.82.			IN	A
;; AUTHORITY SECTION:
.			170	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 02:46:01 CST 2022
;; MSG SIZE  rcvd: 107
        82.103.229.169.in-addr.arpa domain name pointer ste-103-82.reshall.berkeley.edu.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
82.103.229.169.in-addr.arpa	name = ste-103-82.reshall.berkeley.edu.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 137.215.181.250 | attack | Honeypot attack, port: 445, PTR: gksc2k8main.up.ac.za.  | 
                    2020-05-11 01:48:50 | 
| 183.17.146.190 | attack | firewall-block, port(s): 445/tcp  | 
                    2020-05-11 01:51:32 | 
| 49.88.112.75 | attack | May 10 2020, 17:44:27 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.  | 
                    2020-05-11 01:52:44 | 
| 195.54.166.138 | attackspambots | Fail2Ban Ban Triggered  | 
                    2020-05-11 01:53:01 | 
| 114.237.131.241 | attack | 2020-05-11 01:27:43 | |
| 197.45.122.180 | attack | firewall-block, port(s): 445/tcp  | 
                    2020-05-11 01:33:47 | 
| 1.55.103.21 | attackspam | 1589112614 - 05/10/2020 14:10:14 Host: 1.55.103.21/1.55.103.21 Port: 445 TCP Blocked  | 
                    2020-05-11 01:57:11 | 
| 61.7.147.29 | attack | May 10 19:15:55 minden010 sshd[24761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.29 May 10 19:15:57 minden010 sshd[24761]: Failed password for invalid user PBX from 61.7.147.29 port 37794 ssh2 May 10 19:20:15 minden010 sshd[27086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.29 ...  | 
                    2020-05-11 01:39:42 | 
| 86.125.112.221 | attackspambots | Honeypot attack, port: 81, PTR: PTR record not found  | 
                    2020-05-11 01:24:03 | 
| 170.106.33.94 | attack | Invalid user wangk from 170.106.33.94 port 55830  | 
                    2020-05-11 01:38:31 | 
| 102.96.154.82 | attack | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-05-11 01:31:06 | 
| 185.216.140.252 | attackspam | 
  | 
                    2020-05-11 01:50:18 | 
| 38.203.0.226 | spam | boring unsollicited spam emails  | 
                    2020-05-11 01:53:28 | 
| 134.209.102.196 | attack | May 10 18:35:17 l02a sshd[2160]: Invalid user serveur6 from 134.209.102.196 May 10 18:35:17 l02a sshd[2160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 May 10 18:35:17 l02a sshd[2160]: Invalid user serveur6 from 134.209.102.196 May 10 18:35:19 l02a sshd[2160]: Failed password for invalid user serveur6 from 134.209.102.196 port 52486 ssh2  | 
                    2020-05-11 01:55:32 | 
| 113.160.201.250 | attack | Honeypot attack, port: 445, PTR: static.vnpt.vn.  | 
                    2020-05-11 02:03:36 |