City: Greensboro
Region: North Carolina
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.3.38.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;172.3.38.2.			IN	A
;; AUTHORITY SECTION:
.			181	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400
;; Query time: 170 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 12:39:28 CST 2022
;; MSG SIZE  rcvd: 1032.38.3.172.in-addr.arpa domain name pointer 172-3-38-2.lightspeed.gnbonc.sbcglobal.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
2.38.3.172.in-addr.arpa	name = 172-3-38-2.lightspeed.gnbonc.sbcglobal.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 220.134.81.73 | attackspam | Honeypot attack, port: 81, PTR: 220-134-81-73.HINET-IP.hinet.net. | 2020-02-11 20:41:33 | 
| 202.29.223.178 | attackbots | Hits on port : 8291 | 2020-02-11 20:26:06 | 
| 195.54.9.186 | attack | 1581396541 - 02/11/2020 05:49:01 Host: 195.54.9.186/195.54.9.186 Port: 445 TCP Blocked | 2020-02-11 20:26:39 | 
| 123.21.167.46 | attack | 2020-02-1105:48:131j1NT3-0007JI-JJ\<=verena@rs-solution.chH=\(localhost\)[79.164.233.69]:36491P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2513id=696CDA89825678CB17125BE3179B7C86@rs-solution.chT="\;Dbeveryhappytoobtainyourmail\ | 2020-02-11 20:56:40 | 
| 80.211.136.164 | attackspam | Feb 10 23:11:38 wbs sshd\[1588\]: Invalid user eho from 80.211.136.164 Feb 10 23:11:38 wbs sshd\[1588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.136.164 Feb 10 23:11:39 wbs sshd\[1588\]: Failed password for invalid user eho from 80.211.136.164 port 52304 ssh2 Feb 10 23:17:40 wbs sshd\[2050\]: Invalid user jop from 80.211.136.164 Feb 10 23:17:40 wbs sshd\[2050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.136.164 | 2020-02-11 20:45:58 | 
| 125.25.82.45 | attack | Honeypot attack, port: 445, PTR: node-g8d.pool-125-25.dynamic.totinternet.net. | 2020-02-11 20:54:26 | 
| 1.55.94.204 | attack | Honeypot attack, port: 445, PTR: PTR record not found | 2020-02-11 20:13:49 | 
| 178.88.80.171 | attackspam | Telnet/23 MH Probe, BF, Hack - | 2020-02-11 20:46:50 | 
| 115.218.18.141 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found | 2020-02-11 20:28:25 | 
| 77.85.203.36 | attackbotsspam | " " | 2020-02-11 20:36:26 | 
| 220.135.200.26 | attack | Port probing on unauthorized port 23 | 2020-02-11 20:48:46 | 
| 5.196.70.107 | attack | Feb 10 21:01:09 sachi sshd\[27173\]: Invalid user jhc from 5.196.70.107 Feb 10 21:01:09 sachi sshd\[27173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns379769.ip-5-196-70.eu Feb 10 21:01:11 sachi sshd\[27173\]: Failed password for invalid user jhc from 5.196.70.107 port 35106 ssh2 Feb 10 21:02:49 sachi sshd\[27317\]: Invalid user ppr from 5.196.70.107 Feb 10 21:02:49 sachi sshd\[27317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns379769.ip-5-196-70.eu | 2020-02-11 20:23:02 | 
| 125.24.55.142 | attack | Honeypot attack, port: 445, PTR: node-az2.pool-125-24.dynamic.totinternet.net. | 2020-02-11 20:47:44 | 
| 171.231.116.222 | attackspambots | 1581396531 - 02/11/2020 05:48:51 Host: 171.231.116.222/171.231.116.222 Port: 445 TCP Blocked | 2020-02-11 20:30:36 | 
| 219.252.220.70 | attack | Telnet/23 MH Probe, BF, Hack - | 2020-02-11 20:35:54 |