City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.88.99.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.88.99.39.			IN	A
;; AUTHORITY SECTION:
.			253	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011100 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 01:20:48 CST 2022
;; MSG SIZE  rcvd: 105
        Host 39.99.88.199.in-addr.arpa not found: 2(SERVFAIL)
        server can't find 199.88.99.39.in-addr.arpa: SERVFAIL
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 187.178.242.58 | attack | Auto Detect Rule! proto TCP (SYN), 187.178.242.58:40978->gjan.info:1433, len 40  | 
                    2020-09-21 16:15:51 | 
| 49.49.248.141 | attackspam | Web scan/attack: detected 1 distinct attempts within a 12-hour window (Tomcat Vulnerability Scan)  | 
                    2020-09-21 15:54:21 | 
| 189.115.61.5 | attackbots | Unauthorized connection attempt from IP address 189.115.61.5 on Port 445(SMB)  | 
                    2020-09-21 15:57:07 | 
| 210.86.172.86 | attackbotsspam | 2020-09-20T21:25:10.418631server.mjenks.net sshd[2281497]: Failed password for root from 210.86.172.86 port 40716 ssh2 2020-09-20T21:29:38.715115server.mjenks.net sshd[2282107]: Invalid user admin from 210.86.172.86 port 52226 2020-09-20T21:29:38.721769server.mjenks.net sshd[2282107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.86.172.86 2020-09-20T21:29:38.715115server.mjenks.net sshd[2282107]: Invalid user admin from 210.86.172.86 port 52226 2020-09-20T21:29:40.367012server.mjenks.net sshd[2282107]: Failed password for invalid user admin from 210.86.172.86 port 52226 ssh2 ...  | 
                    2020-09-21 16:18:48 | 
| 121.190.3.139 | attack | Connection to SSH Honeypot - Detected by HoneypotDB  | 
                    2020-09-21 16:07:51 | 
| 109.167.231.99 | attackbotsspam | DATE:2020-09-21 08:37:21, IP:109.167.231.99, PORT:ssh SSH brute force auth (docker-dc)  | 
                    2020-09-21 16:23:55 | 
| 139.199.94.51 | attack | SSH Brute-Force Attack  | 
                    2020-09-21 16:02:12 | 
| 14.241.251.162 | attackbotsspam | Unauthorized connection attempt from IP address 14.241.251.162 on Port 445(SMB)  | 
                    2020-09-21 15:56:44 | 
| 212.87.173.34 | attackbotsspam | Auto Detect Rule! proto TCP (SYN), 212.87.173.34:29532->gjan.info:23, len 40  | 
                    2020-09-21 16:17:15 | 
| 46.101.193.99 | attack | 46.101.193.99 - - [21/Sep/2020:07:41:45 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 46.101.193.99 - - [21/Sep/2020:07:41:47 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 46.101.193.99 - - [21/Sep/2020:07:41:48 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2020-09-21 16:06:44 | 
| 222.186.42.155 | attack | Sep 21 10:04:47 markkoudstaal sshd[12248]: Failed password for root from 222.186.42.155 port 58068 ssh2 Sep 21 10:04:49 markkoudstaal sshd[12248]: Failed password for root from 222.186.42.155 port 58068 ssh2 Sep 21 10:04:51 markkoudstaal sshd[12248]: Failed password for root from 222.186.42.155 port 58068 ssh2 ...  | 
                    2020-09-21 16:05:14 | 
| 192.241.238.97 | attackspambots | 2455/tcp 953/tcp 7574/tcp... [2020-07-23/09-20]34pkt,32pt.(tcp)  | 
                    2020-09-21 16:27:35 | 
| 124.156.245.149 | attackbots | Found on CINS badguys / proto=6 . srcport=55484 . dstport=8001 . (2316)  | 
                    2020-09-21 16:02:32 | 
| 119.190.64.150 | attack | Port probing on unauthorized port 23  | 
                    2020-09-21 16:24:57 | 
| 159.65.158.172 | attackbotsspam | 2020-09-20T01:28:40.382954morrigan.ad5gb.com sshd[797284]: Disconnected from invalid user admin 159.65.158.172 port 53090 [preauth]  | 
                    2020-09-21 16:03:31 |