City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 173.144.5.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;173.144.5.20.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 19:44:17 CST 2025
;; MSG SIZE  rcvd: 105Host 20.5.144.173.in-addr.arpa not found: 2(SERVFAIL);; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53
** server can't find 20.5.144.173.in-addr.arpa: SERVFAIL| IP | Type | Details | Datetime | 
|---|---|---|---|
| 112.252.64.215 | attackspambots | Seq 2995002506 | 2019-12-07 03:28:50 | 
| 223.17.114.203 | attack | Seq 2995002506 | 2019-12-07 03:15:37 | 
| 113.224.0.5 | attackbots | Seq 2995002506 | 2019-12-07 03:28:26 | 
| 124.112.169.28 | attack | Seq 2995002506 | 2019-12-07 03:25:11 | 
| 124.236.22.54 | attackbotsspam | Dec 6 20:03:54 sso sshd[9155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.236.22.54 Dec 6 20:03:57 sso sshd[9155]: Failed password for invalid user candi from 124.236.22.54 port 56680 ssh2 ... | 2019-12-07 03:11:06 | 
| 45.143.221.28 | attack | 45.143.221.28 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 5, 9, 119 | 2019-12-07 03:07:46 | 
| 61.161.237.38 | attackbotsspam | Dec 6 07:14:34 server sshd\[22466\]: Failed password for invalid user topolino from 61.161.237.38 port 48212 ssh2 Dec 6 19:38:11 server sshd\[855\]: Invalid user guest from 61.161.237.38 Dec 6 19:38:11 server sshd\[855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.161.237.38 Dec 6 19:38:13 server sshd\[855\]: Failed password for invalid user guest from 61.161.237.38 port 56322 ssh2 Dec 6 20:04:14 server sshd\[8425\]: Invalid user tyson from 61.161.237.38 ... | 2019-12-07 02:49:08 | 
| 117.28.158.159 | attackspambots | Seq 2995002506 | 2019-12-07 03:27:28 | 
| 157.245.107.153 | attack | 2019-12-06T18:03:29.578745abusebot-4.cloudsearch.cf sshd\[27158\]: Invalid user seng from 157.245.107.153 port 48822 | 2019-12-07 03:06:22 | 
| 223.252.72.189 | attackbotsspam | Seq 2995002506 | 2019-12-07 03:15:00 | 
| 223.75.116.49 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort | 2019-12-07 02:48:05 | 
| 191.34.162.186 | attackspambots | $f2bV_matches | 2019-12-07 03:17:04 | 
| 45.82.34.18 | attackspam | postfix (unknown user, SPF fail or relay access denied) | 2019-12-07 03:11:53 | 
| 118.103.212.3 | attack | " " | 2019-12-07 03:26:56 | 
| 116.234.1.229 | attackspambots | Seq 2995002506 | 2019-12-07 03:27:53 |