City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.16.80.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.16.80.229.			IN	A
;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010600 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 18:42:04 CST 2022
;; MSG SIZE  rcvd: 105
        Host 229.80.16.18.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 229.80.16.18.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 13.68.137.194 | attackspambots | Invalid user smmsp from 13.68.137.194 port 52244  | 
                    2019-11-30 22:16:45 | 
| 185.176.27.170 | attack | 11/30/2019-14:28:01.523628 185.176.27.170 Protocol: 6 ET DROP Dshield Block Listed Source group 1  | 
                    2019-11-30 22:30:01 | 
| 154.8.209.64 | attackspambots | Invalid user ra from 154.8.209.64 port 59500  | 
                    2019-11-30 22:08:18 | 
| 159.203.201.200 | attack | ET DROP Dshield Block Listed Source group 1 - port: 35688 proto: TCP cat: Misc Attack  | 
                    2019-11-30 22:40:04 | 
| 80.211.189.181 | attack | $f2bV_matches  | 
                    2019-11-30 22:44:02 | 
| 117.50.36.53 | attack | Nov 30 14:34:39 zeus sshd[18783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.36.53 Nov 30 14:34:41 zeus sshd[18783]: Failed password for invalid user hoban from 117.50.36.53 port 33304 ssh2 Nov 30 14:38:46 zeus sshd[18890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.36.53 Nov 30 14:38:48 zeus sshd[18890]: Failed password for invalid user capobianco from 117.50.36.53 port 34398 ssh2  | 
                    2019-11-30 22:41:51 | 
| 79.137.72.121 | attack | Nov 30 13:44:14 ns382633 sshd\[24172\]: Invalid user bourez from 79.137.72.121 port 38012 Nov 30 13:44:14 ns382633 sshd\[24172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121 Nov 30 13:44:15 ns382633 sshd\[24172\]: Failed password for invalid user bourez from 79.137.72.121 port 38012 ssh2 Nov 30 14:03:19 ns382633 sshd\[27756\]: Invalid user basic from 79.137.72.121 port 56066 Nov 30 14:03:19 ns382633 sshd\[27756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121  | 
                    2019-11-30 22:17:48 | 
| 115.41.57.249 | attackbotsspam | Fail2Ban - SSH Bruteforce Attempt  | 
                    2019-11-30 22:18:57 | 
| 92.118.160.37 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 86 - port: 4002 proto: TCP cat: Misc Attack  | 
                    2019-11-30 22:26:40 | 
| 14.186.20.139 | attackspam | Nov 30 01:10:18 penfold postfix/smtpd[2042]: warning: hostname static.vnpt.vn does not resolve to address 14.186.20.139 Nov 30 01:10:18 penfold postfix/smtpd[2042]: connect from unknown[14.186.20.139] Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.186.20.139  | 
                    2019-11-30 22:10:05 | 
| 80.229.253.212 | attackspam | Invalid user nginx from 80.229.253.212 port 35211  | 
                    2019-11-30 22:21:56 | 
| 73.203.102.132 | attack | Nov 29 00:42:39 fwservlet sshd[21372]: Invalid user server from 73.203.102.132 Nov 29 00:42:39 fwservlet sshd[21372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.203.102.132 Nov 29 00:42:42 fwservlet sshd[21372]: Failed password for invalid user server from 73.203.102.132 port 47288 ssh2 Nov 29 00:42:42 fwservlet sshd[21372]: Received disconnect from 73.203.102.132 port 47288:11: Bye Bye [preauth] Nov 29 00:42:42 fwservlet sshd[21372]: Disconnected from 73.203.102.132 port 47288 [preauth] Nov 29 00:57:15 fwservlet sshd[21534]: Invalid user ntadmin from 73.203.102.132 Nov 29 00:57:15 fwservlet sshd[21534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.203.102.132 Nov 29 00:57:16 fwservlet sshd[21534]: Failed password for invalid user ntadmin from 73.203.102.132 port 41384 ssh2 Nov 29 00:57:16 fwservlet sshd[21534]: Received disconnect from 73.203.102.132 port 41384:11: Bye Bye [pr........ -------------------------------  | 
                    2019-11-30 22:23:13 | 
| 14.236.185.62 | attackspam | 2019-11-30T06:17:12.344Z CLOSE host=14.236.185.62 port=51245 fd=4 time=20.011 bytes=27 ...  | 
                    2019-11-30 22:31:26 | 
| 50.79.140.161 | attackbotsspam | Triggered by Fail2Ban at Ares web server  | 
                    2019-11-30 22:05:35 | 
| 45.67.14.152 | attackbots | 22/tcp 22/tcp 22/tcp... [2019-09-29/11-30]9pkt,1pt.(tcp)  | 
                    2019-11-30 22:10:30 |