City: Port Elizabeth
Region: Eastern Cape
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.94.82.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35303
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;197.94.82.234.			IN	A
;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:05:03 CST 2022
;; MSG SIZE  rcvd: 106
        234.82.94.197.in-addr.arpa domain name pointer 197-94-82-234.hff.mweb.co.za.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
234.82.94.197.in-addr.arpa	name = 197-94-82-234.hff.mweb.co.za.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 186.154.44.229 | attackbots | Honeypot attack, port: 81, PTR: dynamic-186-154-44-229.dynamic.etb.net.co.  | 
                    2020-02-25 14:01:05 | 
| 140.249.18.118 | attackspam | SSH Brute Force  | 
                    2020-02-25 14:16:20 | 
| 49.145.192.35 | attackspambots | Honeypot attack, port: 445, PTR: dsl.49.145.192.35.pldt.net.  | 
                    2020-02-25 14:55:15 | 
| 123.125.71.100 | attack | Bad bot/spoofed identity  | 
                    2020-02-25 14:11:44 | 
| 66.70.160.187 | attack | 66.70.160.187 - - [24/Feb/2020:23:12:20 -0500] "POST /xmlrpc.php HTTP/1.1" 403 3528 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2020-02-25 14:12:01 | 
| 36.77.92.170 | attack | [portscan] Port scan  | 
                    2020-02-25 14:54:12 | 
| 186.207.116.99 | attackbotsspam | Honeypot attack, port: 5555, PTR: bacf7463.virtua.com.br.  | 
                    2020-02-25 14:25:29 | 
| 51.38.33.178 | attackbots | 2019-12-09T20:56:35.551174suse-nuc sshd[2489]: Invalid user admin from 51.38.33.178 port 54120 ...  | 
                    2020-02-25 14:01:24 | 
| 1.32.249.34 | attackspambots | firewall-block, port(s): 1433/tcp  | 
                    2020-02-25 14:49:39 | 
| 119.40.37.126 | attack | Feb 25 04:53:23 localhost sshd\[94272\]: Invalid user ec2-user from 119.40.37.126 port 31223 Feb 25 04:53:23 localhost sshd\[94272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.40.37.126 Feb 25 04:53:24 localhost sshd\[94272\]: Failed password for invalid user ec2-user from 119.40.37.126 port 31223 ssh2 Feb 25 04:59:43 localhost sshd\[94458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.40.37.126 user=man Feb 25 04:59:45 localhost sshd\[94458\]: Failed password for man from 119.40.37.126 port 50774 ssh2 ...  | 
                    2020-02-25 14:27:36 | 
| 106.12.125.27 | attack | 2019-09-17T22:23:51.290729suse-nuc sshd[14707]: Invalid user spice from 106.12.125.27 port 36516 ...  | 
                    2020-02-25 14:53:37 | 
| 149.129.125.55 | attackspam | scan z  | 
                    2020-02-25 14:52:07 | 
| 58.213.166.140 | attackspambots | Feb 25 07:42:51 localhost sshd\[4877\]: Invalid user art from 58.213.166.140 port 37878 Feb 25 07:42:51 localhost sshd\[4877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.166.140 Feb 25 07:42:54 localhost sshd\[4877\]: Failed password for invalid user art from 58.213.166.140 port 37878 ssh2  | 
                    2020-02-25 14:48:20 | 
| 86.108.53.179 | attackbots | 20/2/24@18:19:26: FAIL: Alarm-Telnet address from=86.108.53.179 ...  | 
                    2020-02-25 14:20:53 | 
| 122.180.145.225 | attack | Honeypot attack, port: 445, PTR: nsg-corporate-225.145.180.122.airtel.in.  | 
                    2020-02-25 14:17:46 |