City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.19.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.19.210.			IN	A
;; AUTHORITY SECTION:
.			154	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400
;; Query time: 302 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 21:27:00 CST 2022
;; MSG SIZE  rcvd: 107
        210.19.229.169.in-addr.arpa domain name pointer cnrnexsan2-0.cnr.berkeley.edu.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
210.19.229.169.in-addr.arpa	name = cnrnexsan2-0.cnr.berkeley.edu.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 2.132.31.9 | attackspambots | Unauthorized connection attempt detected from IP address 2.132.31.9 to port 23 [J]  | 
                    2020-01-13 04:39:33 | 
| 202.66.174.146 | attackspam | Unauthorized connection attempt detected from IP address 202.66.174.146 to port 1433 [J]  | 
                    2020-01-13 04:42:11 | 
| 200.31.250.42 | attackspam | Unauthorized connection attempt detected from IP address 200.31.250.42 to port 8080 [J]  | 
                    2020-01-13 04:42:41 | 
| 212.143.120.230 | attack | Unauthorized connection attempt detected from IP address 212.143.120.230 to port 23 [J]  | 
                    2020-01-13 04:41:38 | 
| 103.52.217.139 | attackbotsspam | Unauthorized connection attempt detected from IP address 103.52.217.139 to port 143 [J]  | 
                    2020-01-13 04:54:05 | 
| 188.117.181.92 | attackbotsspam | Unauthorized connection attempt detected from IP address 188.117.181.92 to port 80 [J]  | 
                    2020-01-13 05:09:08 | 
| 1.54.14.23 | attackspambots | Unauthorized connection attempt detected from IP address 1.54.14.23 to port 23 [J]  | 
                    2020-01-13 04:40:17 | 
| 178.159.57.92 | attackbots | Unauthorized connection attempt detected from IP address 178.159.57.92 to port 85 [J]  | 
                    2020-01-13 04:45:36 | 
| 182.254.172.219 | attackspambots | Jan 12 20:54:29 vps58358 sshd\[27101\]: Invalid user puppet from 182.254.172.219Jan 12 20:54:31 vps58358 sshd\[27101\]: Failed password for invalid user puppet from 182.254.172.219 port 53674 ssh2Jan 12 20:58:02 vps58358 sshd\[27132\]: Invalid user chiudi from 182.254.172.219Jan 12 20:58:04 vps58358 sshd\[27132\]: Failed password for invalid user chiudi from 182.254.172.219 port 47932 ssh2Jan 12 21:01:29 vps58358 sshd\[27163\]: Invalid user people from 182.254.172.219Jan 12 21:01:31 vps58358 sshd\[27163\]: Failed password for invalid user people from 182.254.172.219 port 35104 ssh2 ...  | 
                    2020-01-13 05:11:00 | 
| 109.201.14.114 | attackspam | Unauthorized connection attempt detected from IP address 109.201.14.114 to port 23 [J]  | 
                    2020-01-13 04:52:58 | 
| 36.72.219.104 | attackspambots | Unauthorized connection attempt detected from IP address 36.72.219.104 to port 23 [J]  | 
                    2020-01-13 05:02:14 | 
| 46.105.227.206 | attack | Unauthorized connection attempt detected from IP address 46.105.227.206 to port 2220 [J]  | 
                    2020-01-13 04:36:54 | 
| 198.27.90.106 | attack | $f2bV_matches  | 
                    2020-01-13 05:06:34 | 
| 177.222.182.65 | attackspam | Unauthorized connection attempt detected from IP address 177.222.182.65 to port 80 [J]  | 
                    2020-01-13 04:45:57 | 
| 130.0.58.224 | attackspambots | Unauthorized connection attempt detected from IP address 130.0.58.224 to port 23 [J]  | 
                    2020-01-13 04:50:30 |