City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.198.116.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.198.116.39.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:47:10 CST 2025
;; MSG SIZE  rcvd: 105Host 39.116.198.2.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 39.116.198.2.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 27.72.72.48 | attackbots | Unauthorised access (Jan 20) SRC=27.72.72.48 LEN=52 TTL=109 ID=25886 DF TCP DPT=445 WINDOW=8192 SYN | 2020-01-20 15:48:57 | 
| 218.78.46.81 | attackbotsspam | Jan 20 08:07:01 pornomens sshd\[1139\]: Invalid user quake from 218.78.46.81 port 57809 Jan 20 08:07:01 pornomens sshd\[1139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81 Jan 20 08:07:03 pornomens sshd\[1139\]: Failed password for invalid user quake from 218.78.46.81 port 57809 ssh2 ... | 2020-01-20 15:16:25 | 
| 164.68.123.81 | attackspam | Jan 20 07:14:11 sigma sshd\[30190\]: Invalid user administrador from 164.68.123.81Jan 20 07:14:14 sigma sshd\[30190\]: Failed password for invalid user administrador from 164.68.123.81 port 36550 ssh2 ... | 2020-01-20 15:44:07 | 
| 145.239.11.235 | attack | 21 attempts against mh-ssh on cloud.magehost.pro | 2020-01-20 15:25:58 | 
| 117.107.133.162 | attackbots | Unauthorized connection attempt detected from IP address 117.107.133.162 to port 2220 [J] | 2020-01-20 15:35:21 | 
| 212.92.114.28 | attackbots | Unauthorized connection attempt detected from IP address 212.92.114.28 to port 3389 [J] | 2020-01-20 15:45:28 | 
| 45.70.3.10 | attackspam | $f2bV_matches | 2020-01-20 15:17:03 | 
| 123.231.237.130 | attackspambots | 1579496174 - 01/20/2020 05:56:14 Host: 123.231.237.130/123.231.237.130 Port: 445 TCP Blocked | 2020-01-20 15:17:25 | 
| 45.95.33.201 | attack | $f2bV_matches | 2020-01-20 15:43:37 | 
| 159.203.201.115 | attackspambots | 01/20/2020-08:01:41.726562 159.203.201.115 Protocol: 6 ET DROP Dshield Block Listed Source group 1 | 2020-01-20 15:56:10 | 
| 165.227.69.39 | attackbotsspam | Jan 20 07:18:06 lnxded63 sshd[21606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.69.39 | 2020-01-20 15:27:55 | 
| 43.245.222.176 | attackspambots | Unauthorized connection attempt detected from IP address 43.245.222.176 to port 8889 [J] | 2020-01-20 15:40:17 | 
| 218.92.0.158 | attackbotsspam | Jan 20 02:23:28 NPSTNNYC01T sshd[5314]: Failed password for root from 218.92.0.158 port 10921 ssh2 Jan 20 02:23:40 NPSTNNYC01T sshd[5314]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 10921 ssh2 [preauth] Jan 20 02:23:48 NPSTNNYC01T sshd[5318]: Failed password for root from 218.92.0.158 port 40944 ssh2 ... | 2020-01-20 15:31:41 | 
| 180.241.149.111 | attack | 1579496163 - 01/20/2020 05:56:03 Host: 180.241.149.111/180.241.149.111 Port: 445 TCP Blocked | 2020-01-20 15:23:45 | 
| 77.247.108.77 | attack | Unauthorized connection attempt detected from IP address 77.247.108.77 to port 443 [J] | 2020-01-20 15:23:19 |