City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.117.5.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19717
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.117.5.13.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 00:21:40 CST 2025
;; MSG SIZE  rcvd: 10513.5.117.198.in-addr.arpa domain name pointer ndjslfe02.ndc.nasa.gov.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
13.5.117.198.in-addr.arpa	name = ndjslfe02.ndc.nasa.gov.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 189.243.155.136 | attackbotsspam | Honeypot attack, port: 445, PTR: dsl-189-243-155-136-dyn.prod-infinitum.com.mx. | 2019-06-26 07:44:41 | 
| 51.254.49.102 | attack | 11211/tcp 135/tcp 143/tcp... [2019-04-25/06-25]16pkt,10pt.(tcp) | 2019-06-26 07:58:28 | 
| 87.2.102.209 | attackspambots | SSH-bruteforce attempts | 2019-06-26 07:31:15 | 
| 76.168.177.52 | attack | port scan and connect, tcp 8080 (http-proxy) | 2019-06-26 07:50:55 | 
| 123.188.206.221 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found | 2019-06-26 07:19:50 | 
| 125.25.150.159 | attackbotsspam | Honeypot attack, port: 23, PTR: node-tr3.pool-125-25.dynamic.totinternet.net. | 2019-06-26 07:21:57 | 
| 202.29.213.229 | attackbotsspam | TCP src-port=11159 dst-port=25 dnsbl-sorbs abuseat-org barracuda (Project Honey Pot rated Suspicious) (1201) | 2019-06-26 07:43:13 | 
| 194.61.24.67 | attackbotsspam | RDP Bruteforce | 2019-06-26 07:28:36 | 
| 177.99.197.111 | attack | Jun 25 19:11:52 icinga sshd[30428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.197.111 Jun 25 19:11:54 icinga sshd[30428]: Failed password for invalid user luser from 177.99.197.111 port 40265 ssh2 ... | 2019-06-26 07:54:22 | 
| 189.204.131.149 | attack | TCP src-port=40824 dst-port=25 dnsbl-sorbs abuseat-org barracuda (1209) | 2019-06-26 07:18:19 | 
| 162.243.144.26 | attack | 25.06.2019 18:38:03 Connection to port 53 blocked by firewall | 2019-06-26 07:49:55 | 
| 107.170.192.217 | attackspambots | IP: 107.170.192.217 ASN: AS14061 DigitalOcean LLC Port: World Wide Web HTTP 80 Date: 25/06/2019 7:40:12 PM UTC | 2019-06-26 08:03:21 | 
| 142.93.178.87 | attackbots | Jun 25 23:10:31 OPSO sshd\[31938\]: Invalid user ts3bot from 142.93.178.87 port 59922 Jun 25 23:10:31 OPSO sshd\[31938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.178.87 Jun 25 23:10:34 OPSO sshd\[31938\]: Failed password for invalid user ts3bot from 142.93.178.87 port 59922 ssh2 Jun 25 23:12:14 OPSO sshd\[32051\]: Invalid user horizon from 142.93.178.87 port 48890 Jun 25 23:12:14 OPSO sshd\[32051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.178.87 | 2019-06-26 07:31:56 | 
| 82.80.249.249 | attack | (mod_security) mod_security (id:211290) triggered by 82.80.249.249 (IL/Israel/bzq-82-80-249-249.dcenter.bezeqint.net): 5 in the last 3600 secs | 2019-06-26 07:50:22 | 
| 190.95.82.66 | attackbotsspam | Jun 26 00:21:14 icinga sshd[28398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.95.82.66 Jun 26 00:21:16 icinga sshd[28398]: Failed password for invalid user sy from 190.95.82.66 port 41042 ssh2 ... | 2019-06-26 07:34:49 |