City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.1.165.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.1.165.145.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121100 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 17:35:31 CST 2024
;; MSG SIZE  rcvd: 106
        Host 145.165.1.199.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 145.165.1.199.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 120.28.192.143 | attack | Unauthorized connection attempt from IP address 120.28.192.143 on Port 445(SMB)  | 
                    2020-02-25 06:38:06 | 
| 36.75.142.215 | attackspambots | Unauthorized connection attempt from IP address 36.75.142.215 on Port 445(SMB)  | 
                    2020-02-25 06:33:51 | 
| 67.209.130.136 | attackspam | Unauthorized connection attempt from IP address 67.209.130.136 on Port 445(SMB)  | 
                    2020-02-25 06:46:37 | 
| 183.171.112.107 | attackspam | Unauthorized connection attempt from IP address 183.171.112.107 on Port 445(SMB)  | 
                    2020-02-25 07:08:12 | 
| 222.186.190.92 | attackbotsspam | Feb 24 23:33:31 server sshd[1825133]: Failed password for root from 222.186.190.92 port 34340 ssh2 Feb 24 23:33:35 server sshd[1825133]: Failed password for root from 222.186.190.92 port 34340 ssh2 Feb 24 23:33:39 server sshd[1825133]: Failed password for root from 222.186.190.92 port 34340 ssh2  | 
                    2020-02-25 06:42:55 | 
| 49.233.180.17 | attack | Port scan on 4 port(s): 2375 2376 2377 4244  | 
                    2020-02-25 06:31:32 | 
| 49.88.112.115 | attackspambots | Feb 24 12:11:41 tdfoods sshd\[24138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115 user=root Feb 24 12:11:43 tdfoods sshd\[24138\]: Failed password for root from 49.88.112.115 port 37239 ssh2 Feb 24 12:14:38 tdfoods sshd\[24395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115 user=root Feb 24 12:14:40 tdfoods sshd\[24395\]: Failed password for root from 49.88.112.115 port 23987 ssh2 Feb 24 12:15:43 tdfoods sshd\[24474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115 user=root  | 
                    2020-02-25 06:32:00 | 
| 58.59.217.171 | attackbotsspam | Brute force blocker - service: proftpd1 - aantal: 42 - Thu May 3 17:10:16 2018  | 
                    2020-02-25 07:05:36 | 
| 49.88.112.67 | attackbotsspam | Feb 24 19:31:54 firewall sshd[27720]: Failed password for root from 49.88.112.67 port 55032 ssh2 Feb 24 19:32:52 firewall sshd[27773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67 user=root Feb 24 19:32:54 firewall sshd[27773]: Failed password for root from 49.88.112.67 port 32631 ssh2 ...  | 
                    2020-02-25 06:34:17 | 
| 110.255.160.13 | attackbots | Brute force blocker - service: proftpd1 - aantal: 76 - Fri May 4 11:25:17 2018  | 
                    2020-02-25 06:55:58 | 
| 193.56.117.9 | attack | tcp 54874  | 
                    2020-02-25 06:36:20 | 
| 223.89.64.61 | attackbots | Brute force blocker - service: proftpd1, proftpd2 - aantal: 155 - Thu May 3 21:50:16 2018  | 
                    2020-02-25 07:02:53 | 
| 123.16.141.152 | attackbotsspam | Unauthorized connection attempt from IP address 123.16.141.152 on Port 445(SMB)  | 
                    2020-02-25 06:41:35 | 
| 201.178.232.164 | attackspam | 1582560540 - 02/24/2020 17:09:00 Host: 201.178.232.164/201.178.232.164 Port: 445 TCP Blocked  | 
                    2020-02-25 07:00:49 | 
| 123.182.226.44 | attackspambots | port scan and connect, tcp 23 (telnet)  | 
                    2020-02-25 06:49:33 |