City: Saratoga Springs
Region: Utah
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.162.159.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;174.162.159.195.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 23:39:34 CST 2025
;; MSG SIZE  rcvd: 108195.159.162.174.in-addr.arpa domain name pointer c-174-162-159-195.hsd1.ut.comcast.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
195.159.162.174.in-addr.arpa	name = c-174-162-159-195.hsd1.ut.comcast.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 106.13.189.172 | attack | Sep 7 18:36:00 ns382633 sshd\[7235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.189.172 user=root Sep 7 18:36:01 ns382633 sshd\[7235\]: Failed password for root from 106.13.189.172 port 39954 ssh2 Sep 7 18:53:37 ns382633 sshd\[10219\]: Invalid user temp from 106.13.189.172 port 42114 Sep 7 18:53:37 ns382633 sshd\[10219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.189.172 Sep 7 18:53:38 ns382633 sshd\[10219\]: Failed password for invalid user temp from 106.13.189.172 port 42114 ssh2 | 2020-09-08 06:19:29 | 
| 195.54.160.183 | attackbotsspam | burst attack trying various username/passwords | 2020-09-08 06:27:20 | 
| 122.152.208.242 | attack | Sep 7 17:53:26 *** sshd[25237]: User root from 122.152.208.242 not allowed because not listed in AllowUsers | 2020-09-08 06:46:00 | 
| 5.188.87.58 | attackspam | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-07T22:29:51Z | 2020-09-08 06:38:44 | 
| 186.47.40.230 | attackspam | port scan and connect, tcp 8080 (http-proxy) | 2020-09-08 06:34:08 | 
| 98.146.212.146 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-07T16:43:59Z and 2020-09-07T16:53:29Z | 2020-09-08 06:27:33 | 
| 5.157.52.80 | attackbotsspam | Unauthorized access detected from black listed ip! | 2020-09-08 06:20:47 | 
| 41.190.153.35 | attackbots | Sep 7 20:22:09 srv-ubuntu-dev3 sshd[127121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.153.35 user=root Sep 7 20:22:11 srv-ubuntu-dev3 sshd[127121]: Failed password for root from 41.190.153.35 port 57054 ssh2 Sep 7 20:25:34 srv-ubuntu-dev3 sshd[127438]: Invalid user aclocal from 41.190.153.35 Sep 7 20:25:34 srv-ubuntu-dev3 sshd[127438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.153.35 Sep 7 20:25:34 srv-ubuntu-dev3 sshd[127438]: Invalid user aclocal from 41.190.153.35 Sep 7 20:25:35 srv-ubuntu-dev3 sshd[127438]: Failed password for invalid user aclocal from 41.190.153.35 port 46912 ssh2 Sep 7 20:29:00 srv-ubuntu-dev3 sshd[127809]: Invalid user admin from 41.190.153.35 Sep 7 20:29:00 srv-ubuntu-dev3 sshd[127809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.153.35 Sep 7 20:29:00 srv-ubuntu-dev3 sshd[127809]: Invalid user ad ... | 2020-09-08 06:22:49 | 
| 195.133.48.31 | attackbotsspam | Sep 7 13:47:08 ws24vmsma01 sshd[65057]: Failed password for root from 195.133.48.31 port 32970 ssh2 ... | 2020-09-08 06:29:28 | 
| 45.153.157.51 | attackbots | Unauthorized access detected from black listed ip! | 2020-09-08 06:22:09 | 
| 180.127.93.84 | attack | Email rejected due to spam filtering | 2020-09-08 06:38:03 | 
| 187.107.67.41 | attackspambots | SSH Invalid Login | 2020-09-08 06:17:32 | 
| 188.254.0.160 | attackspambots | SSH Brute Force | 2020-09-08 06:40:22 | 
| 112.85.42.180 | attack | Sep 8 00:24:02 sd-69548 sshd[1092716]: Unable to negotiate with 112.85.42.180 port 19438: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Sep 8 00:27:07 sd-69548 sshd[1092954]: Unable to negotiate with 112.85.42.180 port 22023: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... | 2020-09-08 06:35:53 | 
| 185.137.233.213 | attackbotsspam | Fail2Ban Ban Triggered | 2020-09-08 06:32:29 |