City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.13.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.13.11.			IN	A
;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400
;; Query time: 137 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 21:26:03 CST 2022
;; MSG SIZE  rcvd: 106
        11.13.229.169.in-addr.arpa domain name pointer rfs-163-124-002-d.berkeley.edu.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
11.13.229.169.in-addr.arpa	name = rfs-163-124-002-d.berkeley.edu.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 131.196.7.234 | attackbotsspam | Jul 18 01:37:01 bouncer sshd\[22482\]: Invalid user ftp_user from 131.196.7.234 port 49951 Jul 18 01:37:01 bouncer sshd\[22482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.196.7.234 Jul 18 01:37:03 bouncer sshd\[22482\]: Failed password for invalid user ftp_user from 131.196.7.234 port 49951 ssh2 ...  | 
                    2019-07-18 08:04:04 | 
| 162.243.139.8 | attackbots | 8140/tcp 1400/tcp 5903/tcp... [2019-05-18/07-15]59pkt,47pt.(tcp),5pt.(udp),1proto  | 
                    2019-07-18 08:14:09 | 
| 61.2.213.76 | attackbotsspam | Honeypot attack, port: 23, PTR: PTR record not found  | 
                    2019-07-18 07:50:41 | 
| 81.196.95.201 | attackspambots | Honeypot attack, port: 23, PTR: 81.196.95.201.bb.fttb.static.rdsar.ro.  | 
                    2019-07-18 07:57:02 | 
| 51.68.243.1 | attack | Jul 18 02:01:57 legacy sshd[24335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.243.1 Jul 18 02:01:59 legacy sshd[24335]: Failed password for invalid user sysadmin from 51.68.243.1 port 57766 ssh2 Jul 18 02:06:52 legacy sshd[24496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.243.1 ...  | 
                    2019-07-18 08:16:26 | 
| 213.32.254.240 | attackbotsspam | proto=tcp . spt=40147 . dpt=25 . (listed on Blocklist de Jul 16) (596)  | 
                    2019-07-18 08:21:46 | 
| 31.61.118.18 | attackbotsspam | Honeypot attack, port: 23, PTR: public-gprs511697.centertel.pl.  | 
                    2019-07-18 07:58:41 | 
| 46.44.171.67 | attackbotsspam | Jul 18 02:05:24 giegler sshd[5589]: Invalid user hospital from 46.44.171.67 port 52702  | 
                    2019-07-18 08:06:22 | 
| 183.185.254.159 | attackspam | Honeypot attack, port: 23, PTR: 159.254.185.183.adsl-pool.sx.cn.  | 
                    2019-07-18 07:48:46 | 
| 124.239.252.22 | attack | Jul 17 19:45:28 eventyay sshd[30792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.252.22 Jul 17 19:45:30 eventyay sshd[30792]: Failed password for invalid user maggie from 124.239.252.22 port 37944 ssh2 Jul 17 19:51:18 eventyay sshd[32341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.252.22 ...  | 
                    2019-07-18 08:12:46 | 
| 111.230.248.125 | attackspambots | Automatic report - Banned IP Access  | 
                    2019-07-18 08:23:04 | 
| 5.135.161.72 | attack | Jul 18 02:20:13 mail sshd\[14554\]: Invalid user user from 5.135.161.72 port 38488 Jul 18 02:20:13 mail sshd\[14554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.161.72 Jul 18 02:20:15 mail sshd\[14554\]: Failed password for invalid user user from 5.135.161.72 port 38488 ssh2 Jul 18 02:24:38 mail sshd\[15220\]: Invalid user ftp from 5.135.161.72 port 36602 Jul 18 02:24:38 mail sshd\[15220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.161.72  | 
                    2019-07-18 08:28:28 | 
| 51.83.78.56 | attackspam | Jul 18 01:38:11 SilenceServices sshd[23589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.56 Jul 18 01:38:12 SilenceServices sshd[23589]: Failed password for invalid user shiny from 51.83.78.56 port 50438 ssh2 Jul 18 01:43:33 SilenceServices sshd[29187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.56  | 
                    2019-07-18 08:01:58 | 
| 195.209.48.51 | attackbotsspam | 'IP reached maximum auth failures for a one day block'  | 
                    2019-07-18 08:29:36 | 
| 160.2.95.199 | attack | kp-nj1-01 recorded 6 login violations from 160.2.95.199 and was blocked at 2019-07-17 16:23:16. 160.2.95.199 has been blocked on 0 previous occasions. 160.2.95.199's first attempt was recorded at 2019-07-17 16:23:16  | 
                    2019-07-18 07:56:07 |