City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.45.66.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47056
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.45.66.68.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:29:44 CST 2025
;; MSG SIZE  rcvd: 105
        Host 68.66.45.198.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 68.66.45.198.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 202.67.40.232 | attackspambots | [Sat Nov 23 21:22:59.933349 2019] [ssl:info] [pid 10420:tid 139721258825472] [client 202.67.40.232:4295] AH02033: No hostname was provided via SNI for a name based virtual host ...  | 
                    2019-11-24 02:30:38 | 
| 140.143.57.159 | attackspambots | F2B jail: sshd. Time: 2019-11-23 18:55:16, Reported by: VKReport  | 
                    2019-11-24 02:10:14 | 
| 1.182.193.141 | attackbots | badbot  | 
                    2019-11-24 02:05:34 | 
| 106.13.181.147 | attackbots | Nov 23 08:17:18 dallas01 sshd[17169]: Failed password for root from 106.13.181.147 port 56504 ssh2 Nov 23 08:22:32 dallas01 sshd[18186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.147 Nov 23 08:22:34 dallas01 sshd[18186]: Failed password for invalid user hal from 106.13.181.147 port 59938 ssh2  | 
                    2019-11-24 02:42:05 | 
| 177.106.72.161 | attack | Unauthorised access (Nov 23) SRC=177.106.72.161 LEN=52 TTL=111 ID=1224 DF TCP DPT=445 WINDOW=8192 SYN  | 
                    2019-11-24 02:24:20 | 
| 106.57.150.51 | attackbots | badbot  | 
                    2019-11-24 02:46:04 | 
| 103.48.193.248 | attack | Nov 23 17:53:53 vpn01 sshd[30960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.193.248 Nov 23 17:53:55 vpn01 sshd[30960]: Failed password for invalid user admin from 103.48.193.248 port 43768 ssh2 ...  | 
                    2019-11-24 02:16:45 | 
| 188.131.138.230 | attackbotsspam | Nov 23 15:59:08 meumeu sshd[11430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.138.230 Nov 23 15:59:09 meumeu sshd[11430]: Failed password for invalid user kase from 188.131.138.230 port 57962 ssh2 Nov 23 16:03:45 meumeu sshd[12258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.138.230 ...  | 
                    2019-11-24 02:14:05 | 
| 185.176.27.54 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort  | 
                    2019-11-24 02:47:25 | 
| 81.196.95.201 | attack | Automatic report - Banned IP Access  | 
                    2019-11-24 02:44:27 | 
| 193.112.164.113 | attackspam | $f2bV_matches  | 
                    2019-11-24 02:28:47 | 
| 175.44.9.132 | attackbots | badbot  | 
                    2019-11-24 02:38:35 | 
| 197.243.34.154 | attack | Nov 23 19:26:06 MK-Soft-Root1 sshd[28597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.243.34.154 Nov 23 19:26:08 MK-Soft-Root1 sshd[28597]: Failed password for invalid user yoyo from 197.243.34.154 port 59232 ssh2 ...  | 
                    2019-11-24 02:44:48 | 
| 198.50.156.164 | attack | Port Scan 1433  | 
                    2019-11-24 02:17:57 | 
| 129.204.37.181 | attackspam | SSH Brute-Force reported by Fail2Ban  | 
                    2019-11-24 02:05:19 |