City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.82.245.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.82.245.4.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:18:13 CST 2025
;; MSG SIZE  rcvd: 1054.245.82.198.in-addr.arpa domain name pointer crc14-218-trees.cns.vt.edu.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
4.245.82.198.in-addr.arpa	name = crc14-218-trees.cns.vt.edu.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 45.118.144.31 | attack | Reported by AbuseIPDB proxy server. | 2019-09-22 20:05:19 | 
| 1.54.161.75 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found | 2019-09-22 19:57:36 | 
| 162.243.131.154 | attack | SSH invalid-user multiple login attempts | 2019-09-22 20:31:52 | 
| 123.207.17.158 | attack | Unauthorized connection attempt from IP address 123.207.17.158 on Port 445(SMB) | 2019-09-22 20:12:28 | 
| 58.240.52.75 | attack | SSH bruteforce | 2019-09-22 19:55:51 | 
| 144.217.83.201 | attack | Sep 22 05:48:22 saschabauer sshd[28892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.83.201 Sep 22 05:48:24 saschabauer sshd[28892]: Failed password for invalid user accounts from 144.217.83.201 port 60460 ssh2 | 2019-09-22 19:58:12 | 
| 177.18.75.41 | attackspam | Connection by 177.18.75.41 on port: 23 got caught by honeypot at 9/21/2019 10:14:50 PM | 2019-09-22 20:09:09 | 
| 192.210.203.179 | attackbotsspam | F2B jail: sshd. Time: 2019-09-22 10:11:13, Reported by: VKReport | 2019-09-22 20:16:10 | 
| 114.67.66.199 | attackbotsspam | ssh failed login | 2019-09-22 20:36:13 | 
| 118.24.182.72 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h | 2019-09-22 20:35:05 | 
| 106.75.79.242 | attackbots | Lines containing failures of 106.75.79.242 (max 1000) Sep 21 05:12:24 localhost sshd[12205]: Invalid user derick from 106.75.79.242 port 53642 Sep 21 05:12:24 localhost sshd[12205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.79.242 Sep 21 05:12:27 localhost sshd[12205]: Failed password for invalid user derick from 106.75.79.242 port 53642 ssh2 Sep 21 05:12:29 localhost sshd[12205]: Received disconnect from 106.75.79.242 port 53642:11: Bye Bye [preauth] Sep 21 05:12:29 localhost sshd[12205]: Disconnected from invalid user derick 106.75.79.242 port 53642 [preauth] Sep 21 05:32:37 localhost sshd[15880]: Invalid user dfk from 106.75.79.242 port 43148 Sep 21 05:32:37 localhost sshd[15880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.79.242 Sep 21 05:32:39 localhost sshd[15880]: Failed password for invalid user dfk from 106.75.79.242 port 43148 ssh2 Sep 21 05:32:41 localhos........ ------------------------------ | 2019-09-22 20:39:25 | 
| 185.234.219.173 | attackbots | Sep 22 12:59:58 mail postfix/smtpd\[2211\]: warning: unknown\[185.234.219.173\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 22 13:39:14 mail postfix/smtpd\[5919\]: warning: unknown\[185.234.219.173\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 22 13:49:04 mail postfix/smtpd\[6118\]: warning: unknown\[185.234.219.173\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 22 13:59:02 mail postfix/smtpd\[6051\]: warning: unknown\[185.234.219.173\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ | 2019-09-22 20:28:17 | 
| 123.195.99.9 | attackbotsspam | Automatic report - SSH Brute-Force Attack | 2019-09-22 20:33:18 | 
| 142.93.69.5 | attack | SSH bruteforce | 2019-09-22 20:32:30 | 
| 90.188.114.107 | attack | Sep 22 10:32:06 markkoudstaal sshd[879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.188.114.107 Sep 22 10:32:08 markkoudstaal sshd[879]: Failed password for invalid user user1 from 90.188.114.107 port 33388 ssh2 Sep 22 10:36:50 markkoudstaal sshd[1299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.188.114.107 | 2019-09-22 20:44:04 |