City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.21.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.21.42.			IN	A
;; AUTHORITY SECTION:
.			516	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400
;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 21:28:25 CST 2022
;; MSG SIZE  rcvd: 106
        42.21.229.169.in-addr.arpa domain name pointer sis-app-qat-02.is.berkeley.edu.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
42.21.229.169.in-addr.arpa	name = sis-app-qat-02.is.berkeley.edu.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 122.51.176.111 | attackspambots | Failed password for root from 122.51.176.111 port 54056 ssh2  | 
                    2020-04-29 23:42:22 | 
| 222.82.214.218 | attack | Failed password for root from 222.82.214.218 port 12335 ssh2  | 
                    2020-04-29 23:29:09 | 
| 104.248.23.230 | attackspambots | Invalid user www from 104.248.23.230 port 55232  | 
                    2020-04-29 23:49:05 | 
| 49.234.192.24 | attackbots | Invalid user hr from 49.234.192.24 port 33638  | 
                    2020-04-29 23:23:19 | 
| 45.55.6.42 | attack | Apr 29 17:18:15 host sshd[30908]: Invalid user acs from 45.55.6.42 port 43198 ...  | 
                    2020-04-29 23:24:36 | 
| 185.88.177.36 | attackbots | Invalid user admin from 185.88.177.36 port 57570  | 
                    2020-04-29 23:33:12 | 
| 187.135.172.154 | attackspam | 1588161702 - 04/29/2020 19:01:42 Host: dsl-187-135-172-154-dyn.prod-infinitum.com.mx/187.135.172.154 Port: 23 TCP Blocked ...  | 
                    2020-04-29 23:28:10 | 
| 14.98.200.167 | attack | $f2bV_matches  | 
                    2020-04-29 23:56:08 | 
| 83.15.127.73 | attackbotsspam | Invalid user vieregge from 83.15.127.73 port 43028  | 
                    2020-04-29 23:20:55 | 
| 118.150.85.111 | attackspambots | Failed password for root from 118.150.85.111 port 49380 ssh2  | 
                    2020-04-29 23:43:35 | 
| 223.223.200.14 | attackspam | Invalid user noeller from 223.223.200.14 port 23697  | 
                    2020-04-29 23:57:26 | 
| 134.209.165.47 | attackspambots | Failed password for root from 134.209.165.47 port 42848 ssh2  | 
                    2020-04-29 23:40:30 | 
| 222.66.154.98 | attack | Apr 29 17:22:26 ns392434 sshd[18015]: Invalid user nikita from 222.66.154.98 port 41310 Apr 29 17:22:26 ns392434 sshd[18015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.66.154.98 Apr 29 17:22:26 ns392434 sshd[18015]: Invalid user nikita from 222.66.154.98 port 41310 Apr 29 17:22:28 ns392434 sshd[18015]: Failed password for invalid user nikita from 222.66.154.98 port 41310 ssh2 Apr 29 17:47:21 ns392434 sshd[19349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.66.154.98 user=root Apr 29 17:47:23 ns392434 sshd[19349]: Failed password for root from 222.66.154.98 port 54246 ssh2 Apr 29 17:52:07 ns392434 sshd[19594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.66.154.98 user=root Apr 29 17:52:09 ns392434 sshd[19594]: Failed password for root from 222.66.154.98 port 51664 ssh2 Apr 29 17:57:03 ns392434 sshd[19696]: Invalid user wc from 222.66.154.98 port 49069  | 
                    2020-04-29 23:58:19 | 
| 202.51.74.189 | attack | Failed password for root from 202.51.74.189 port 56022 ssh2  | 
                    2020-04-29 23:30:47 | 
| 45.14.148.145 | attackbots | 2020-04-29T17:29:07.382931ns386461 sshd\[1825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.148.145 user=root 2020-04-29T17:29:09.393201ns386461 sshd\[1825\]: Failed password for root from 45.14.148.145 port 59122 ssh2 2020-04-29T17:33:39.891596ns386461 sshd\[6113\]: Invalid user wish from 45.14.148.145 port 33686 2020-04-29T17:33:39.896019ns386461 sshd\[6113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.148.145 2020-04-29T17:33:41.580747ns386461 sshd\[6113\]: Failed password for invalid user wish from 45.14.148.145 port 33686 ssh2 ...  | 
                    2020-04-29 23:55:21 |