City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.121.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.121.118.		IN	A
;; AUTHORITY SECTION:
.			103	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 02:46:17 CST 2022
;; MSG SIZE  rcvd: 108
        118.121.229.169.in-addr.arpa domain name pointer uva-121-118.reshall.berkeley.edu.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
118.121.229.169.in-addr.arpa	name = uva-121-118.reshall.berkeley.edu.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 192.241.226.237 | attackbots | " "  | 
                    2020-03-08 02:54:20 | 
| 118.167.11.98 | attack | Honeypot attack, port: 445, PTR: 118-167-11-98.dynamic-ip.hinet.net.  | 
                    2020-03-08 02:57:44 | 
| 179.83.40.243 | attackspam | firewall-block, port(s): 23/tcp  | 
                    2020-03-08 03:00:19 | 
| 61.177.144.130 | attack | SSH invalid-user multiple login attempts  | 
                    2020-03-08 03:24:53 | 
| 217.169.90.248 | attack | firewall-block, port(s): 9530/tcp  | 
                    2020-03-08 03:05:12 | 
| 87.117.216.231 | attackbotsspam | SpamScore above: 10.0  | 
                    2020-03-08 03:10:54 | 
| 123.18.78.112 | attack | Spammer_1  | 
                    2020-03-08 03:21:47 | 
| 212.112.98.146 | attackspambots | Mar 6 18:13:14 server sshd\[8174\]: Invalid user jackson from 212.112.98.146 Mar 6 18:13:14 server sshd\[8174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.112.98.146 Mar 6 18:13:16 server sshd\[8174\]: Failed password for invalid user jackson from 212.112.98.146 port 37441 ssh2 Mar 7 17:17:10 server sshd\[13671\]: Invalid user steam from 212.112.98.146 Mar 7 17:17:10 server sshd\[13671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.112.98.146 ...  | 
                    2020-03-08 02:59:58 | 
| 110.39.23.154 | attack | 1433/tcp 445/tcp... [2020-01-30/03-07]5pkt,2pt.(tcp)  | 
                    2020-03-08 02:49:28 | 
| 201.234.178.151 | attack | Unauthorized connection attempt from IP address 201.234.178.151 on Port 445(SMB)  | 
                    2020-03-08 03:09:04 | 
| 205.185.114.216 | attackbotsspam | 8082/tcp 20000/tcp 9090/tcp... [2020-03-07]29pkt,29pt.(tcp)  | 
                    2020-03-08 02:55:39 | 
| 1.1.217.224 | attack | Honeypot attack, port: 5555, PTR: node-hr4.pool-1-1.dynamic.totinternet.net.  | 
                    2020-03-08 03:04:54 | 
| 124.156.98.182 | attack | suspicious action Sat, 07 Mar 2020 10:29:59 -0300  | 
                    2020-03-08 03:23:49 | 
| 196.52.43.58 | attack | 03/07/2020-13:15:05.761968 196.52.43.58 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-03-08 02:50:54 | 
| 217.182.74.125 | attackbots | Mar 7 14:48:05 server sshd[3927584]: Failed password for invalid user avanti from 217.182.74.125 port 49542 ssh2 Mar 7 14:52:22 server sshd[3934122]: Failed password for invalid user Abcd from 217.182.74.125 port 36934 ssh2 Mar 7 14:56:42 server sshd[3940554]: Failed password for invalid user 12345 from 217.182.74.125 port 52558 ssh2  | 
                    2020-03-08 02:52:20 |