City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.18.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.18.82.			IN	A
;; AUTHORITY SECTION:
.			113	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400
;; Query time: 576 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 21:26:45 CST 2022
;; MSG SIZE  rcvd: 106
        82.18.229.169.in-addr.arpa domain name pointer vlan535.inr-310-ewdc.berkeley.edu.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
82.18.229.169.in-addr.arpa	name = vlan535.inr-310-ewdc.berkeley.edu.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 64.225.99.7 | attackbots | Mar 30 07:00:08 ift sshd\[14601\]: Invalid user brl from 64.225.99.7Mar 30 07:00:10 ift sshd\[14601\]: Failed password for invalid user brl from 64.225.99.7 port 48852 ssh2Mar 30 07:03:42 ift sshd\[15137\]: Invalid user gitlab-psql from 64.225.99.7Mar 30 07:03:45 ift sshd\[15137\]: Failed password for invalid user gitlab-psql from 64.225.99.7 port 35248 ssh2Mar 30 07:07:32 ift sshd\[15848\]: Invalid user ppa from 64.225.99.7 ...  | 
                    2020-03-30 12:59:38 | 
| 106.12.48.217 | attack | SSH bruteforce (Triggered fail2ban)  | 
                    2020-03-30 13:20:16 | 
| 222.129.132.53 | attack | SSH bruteforce  | 
                    2020-03-30 13:06:33 | 
| 94.102.56.215 | attackspambots | 94.102.56.215 was recorded 21 times by 12 hosts attempting to connect to the following ports: 1034,1037,922. Incident counter (4h, 24h, all-time): 21, 121, 9178  | 
                    2020-03-30 13:02:13 | 
| 106.13.188.147 | attackspam | Mar 30 09:53:22 gw1 sshd[19294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.188.147 Mar 30 09:53:24 gw1 sshd[19294]: Failed password for invalid user guide from 106.13.188.147 port 33830 ssh2 ...  | 
                    2020-03-30 12:54:02 | 
| 59.153.254.2 | attack | 1585540540 - 03/30/2020 05:55:40 Host: 59.153.254.2/59.153.254.2 Port: 445 TCP Blocked  | 
                    2020-03-30 13:33:41 | 
| 192.241.211.94 | attackbots | Mar 30 10:07:16 gw1 sshd[19854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.211.94 Mar 30 10:07:18 gw1 sshd[19854]: Failed password for invalid user jac from 192.241.211.94 port 51460 ssh2 ...  | 
                    2020-03-30 13:31:59 | 
| 118.70.184.109 | attackbotsspam | 1585540580 - 03/30/2020 05:56:20 Host: 118.70.184.109/118.70.184.109 Port: 445 TCP Blocked  | 
                    2020-03-30 12:49:31 | 
| 42.101.46.118 | attack | Mar 30 06:59:04  | 
                    2020-03-30 13:01:04 | 
| 150.242.213.189 | attack | SSH Brute-Forcing (server2)  | 
                    2020-03-30 13:21:43 | 
| 171.224.185.172 | attackbots | Mar 30 05:56:08 debian64 sshd[20524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.224.185.172 Mar 30 05:56:10 debian64 sshd[20524]: Failed password for invalid user tech from 171.224.185.172 port 63479 ssh2 ...  | 
                    2020-03-30 13:00:13 | 
| 134.209.186.72 | attackspambots | ssh brute force  | 
                    2020-03-30 13:09:50 | 
| 61.162.25.230 | attackbots | Unauthorised access (Mar 30) SRC=61.162.25.230 LEN=44 TTL=240 ID=57368 TCP DPT=1433 WINDOW=1024 SYN  | 
                    2020-03-30 13:29:04 | 
| 180.76.135.236 | attackspam | ssh brute force  | 
                    2020-03-30 13:14:42 | 
| 211.23.167.241 | attackbotsspam | Honeypot attack, port: 445, PTR: 211-23-167-241.HINET-IP.hinet.net.  | 
                    2020-03-30 13:21:18 |