City: Linköping
Region: Östergötland County
Country: Sweden
Internet Service Provider: Telia
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.198.8.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58523
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.198.8.171.			IN	A
;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122902 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 30 08:11:55 CST 2021
;; MSG SIZE  rcvd: 106171.8.198.195.in-addr.arpa domain name pointer 195-198-8-171.customer.telia.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
171.8.198.195.in-addr.arpa	name = 195-198-8-171.customer.telia.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 140.143.247.30 | attack | Invalid user simran from 140.143.247.30 port 48530 | 2020-03-28 04:21:31 | 
| 142.93.159.29 | attackbots | Mar 27 15:26:55 host01 sshd[25137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.159.29 Mar 27 15:26:57 host01 sshd[25137]: Failed password for invalid user shv from 142.93.159.29 port 49558 ssh2 Mar 27 15:30:30 host01 sshd[25760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.159.29 ... | 2020-03-28 03:53:08 | 
| 5.39.77.117 | attack | (sshd) Failed SSH login from 5.39.77.117 (FR/France/-/-/ns3262586.ip-5-39-77.eu/[AS16276 OVH SAS]): 1 in the last 3600 secs | 2020-03-28 03:48:56 | 
| 94.139.160.112 | attack | SSH login attempts. | 2020-03-28 04:00:05 | 
| 104.254.246.220 | attack | Mar 27 15:37:42 NPSTNNYC01T sshd[10921]: Failed password for invalid user zyn from 104.254.246.220 port 56810 ssh2 Mar 27 15:41:05 NPSTNNYC01T sshd[11046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.254.246.220 Mar 27 15:41:07 NPSTNNYC01T sshd[11046]: Failed password for invalid user mxk from 104.254.246.220 port 41934 ssh2 ... | 2020-03-28 03:58:40 | 
| 104.248.138.38 | attack | Invalid user oracle from 104.248.138.38 port 56464 | 2020-03-28 04:14:09 | 
| 118.70.182.157 | attack | fail2ban | 2020-03-28 04:24:29 | 
| 202.83.10.18 | attackbotsspam | Mar 27 16:52:26 meumeu sshd[6060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.10.18 Mar 27 16:52:29 meumeu sshd[6060]: Failed password for invalid user ktj from 202.83.10.18 port 50120 ssh2 Mar 27 16:56:34 meumeu sshd[6620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.10.18 ... | 2020-03-28 04:10:50 | 
| 106.13.209.16 | attack | Invalid user tlp from 106.13.209.16 port 55488 | 2020-03-28 03:47:24 | 
| 45.80.67.103 | attack | Invalid user fdb from 45.80.67.103 port 49492 | 2020-03-28 03:48:38 | 
| 104.244.75.244 | attackbots | Triggered by Fail2Ban at Ares web server | 2020-03-28 04:15:18 | 
| 124.77.119.40 | attack | $f2bV_matches | 2020-03-28 04:13:52 | 
| 116.72.51.190 | attackspam | SSH login attempts. | 2020-03-28 04:10:17 | 
| 177.125.164.225 | attack | Mar 27 20:34:48 santamaria sshd\[31866\]: Invalid user nku from 177.125.164.225 Mar 27 20:34:48 santamaria sshd\[31866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.125.164.225 Mar 27 20:34:51 santamaria sshd\[31866\]: Failed password for invalid user nku from 177.125.164.225 port 51984 ssh2 ... | 2020-03-28 03:54:20 | 
| 140.143.57.159 | attackspam | Mar 27 20:31:07 webhost01 sshd[10120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.159 Mar 27 20:31:09 webhost01 sshd[10120]: Failed password for invalid user xbb from 140.143.57.159 port 39532 ssh2 ... | 2020-03-28 04:13:29 |