City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.42.218.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29449
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.42.218.18.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 00:06:16 CST 2025
;; MSG SIZE  rcvd: 106Host 18.218.42.195.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 18.218.42.195.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 49.142.102.191 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - | 2020-05-26 17:04:46 | 
| 222.186.175.216 | attack | May 26 10:43:25 abendstille sshd\[15066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root May 26 10:43:26 abendstille sshd\[15062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root May 26 10:43:27 abendstille sshd\[15066\]: Failed password for root from 222.186.175.216 port 59636 ssh2 May 26 10:43:28 abendstille sshd\[15062\]: Failed password for root from 222.186.175.216 port 63710 ssh2 May 26 10:43:30 abendstille sshd\[15066\]: Failed password for root from 222.186.175.216 port 59636 ssh2 ... | 2020-05-26 16:56:22 | 
| 198.211.120.99 | attackspam | Brute-force attempt banned | 2020-05-26 17:13:17 | 
| 101.51.149.20 | attackbots | Unauthorized connection attempt from IP address 101.51.149.20 on Port 445(SMB) | 2020-05-26 17:18:49 | 
| 222.186.15.115 | attackbotsspam | 26.05.2020 09:03:51 SSH access blocked by firewall | 2020-05-26 17:13:00 | 
| 115.74.250.176 | attackbotsspam | Unauthorized connection attempt from IP address 115.74.250.176 on Port 445(SMB) | 2020-05-26 16:43:19 | 
| 120.133.131.62 | attackbotsspam | Unauthorized connection attempt from IP address 120.133.131.62 on Port 445(SMB) | 2020-05-26 17:12:15 | 
| 178.176.166.147 | attackbotsspam | Unauthorized connection attempt from IP address 178.176.166.147 on Port 445(SMB) | 2020-05-26 16:46:51 | 
| 187.189.24.72 | attackbotsspam | May 26 01:32:30 Host-KLAX-C dovecot: imap-login: Disconnected (auth failed, 1 attempts in 7 secs): user= | 2020-05-26 16:56:48 | 
| 119.195.69.212 | attack | Port probing on unauthorized port 23 | 2020-05-26 16:50:11 | 
| 170.178.185.226 | attackbots | Unauthorized connection attempt from IP address 170.178.185.226 on Port 445(SMB) | 2020-05-26 17:07:04 | 
| 222.186.175.212 | attackspambots | May 26 08:24:46 sshgateway sshd\[23898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212 user=root May 26 08:24:48 sshgateway sshd\[23898\]: Failed password for root from 222.186.175.212 port 42270 ssh2 May 26 08:25:03 sshgateway sshd\[23898\]: Failed password for root from 222.186.175.212 port 42270 ssh2 | 2020-05-26 16:44:06 | 
| 171.228.223.68 | attackspambots | Unauthorized connection attempt from IP address 171.228.223.68 on Port 445(SMB) | 2020-05-26 17:10:31 | 
| 220.142.57.90 | attack | Telnet/23 MH Probe, Scan, BF, Hack - | 2020-05-26 16:49:27 | 
| 118.70.186.189 | attackbots | Unauthorized connection attempt from IP address 118.70.186.189 on Port 445(SMB) | 2020-05-26 16:51:35 |