City: unknown
Region: unknown
Country: Venezuela
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.11.212.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7706
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;200.11.212.194.			IN	A
;; AUTHORITY SECTION:
.			329	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 02:33:27 CST 2022
;; MSG SIZE  rcvd: 107194.212.11.200.in-addr.arpa domain name pointer 200-11-212-194.estatic.cantv.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
194.212.11.200.in-addr.arpa	name = 200-11-212-194.estatic.cantv.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 120.224.101.134 | attackspam | Honeypot attack, port: 23, PTR: PTR record not found | 2019-09-30 15:29:55 | 
| 106.13.4.117 | attackspam | $f2bV_matches | 2019-09-30 15:39:53 | 
| 114.7.120.10 | attackspam | Sep 30 09:10:57 v22019058497090703 sshd[9859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.120.10 Sep 30 09:10:59 v22019058497090703 sshd[9859]: Failed password for invalid user teamspeak from 114.7.120.10 port 44789 ssh2 Sep 30 09:16:12 v22019058497090703 sshd[10257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.120.10 ... | 2019-09-30 15:51:09 | 
| 60.3.101.214 | attack | 23/tcp [2019-09-30]1pkt | 2019-09-30 15:35:00 | 
| 35.189.214.193 | attack | 2323/tcp [2019-09-30]1pkt | 2019-09-30 15:39:33 | 
| 186.227.162.102 | attack | Automatic report - Banned IP Access | 2019-09-30 15:47:27 | 
| 200.11.219.206 | attack | Sep 30 10:09:30 server sshd\[30181\]: Invalid user admin from 200.11.219.206 port 15655 Sep 30 10:09:30 server sshd\[30181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.219.206 Sep 30 10:09:32 server sshd\[30181\]: Failed password for invalid user admin from 200.11.219.206 port 15655 ssh2 Sep 30 10:13:25 server sshd\[11863\]: Invalid user smile from 200.11.219.206 port 31678 Sep 30 10:13:25 server sshd\[11863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.219.206 | 2019-09-30 15:30:16 | 
| 40.77.167.55 | attack | Automatic report - Banned IP Access | 2019-09-30 15:43:19 | 
| 106.12.114.173 | attackspam | ssh brute force | 2019-09-30 15:20:21 | 
| 118.25.108.198 | attack | Sep 30 09:14:17 v22019058497090703 sshd[10106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.108.198 Sep 30 09:14:18 v22019058497090703 sshd[10106]: Failed password for invalid user gnome-initial-setup from 118.25.108.198 port 40392 ssh2 Sep 30 09:19:45 v22019058497090703 sshd[10550]: Failed password for root from 118.25.108.198 port 52358 ssh2 ... | 2019-09-30 15:40:43 | 
| 222.186.180.147 | attackspambots | port scan and connect, tcp 22 (ssh) | 2019-09-30 15:31:32 | 
| 114.5.12.186 | attack | Sep 30 08:02:34 v22019058497090703 sshd[4161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.5.12.186 Sep 30 08:02:36 v22019058497090703 sshd[4161]: Failed password for invalid user taf from 114.5.12.186 port 42448 ssh2 Sep 30 08:07:13 v22019058497090703 sshd[4524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.5.12.186 ... | 2019-09-30 15:13:06 | 
| 51.89.149.190 | attackbots | Sep 30 07:53:17 new sshd[26526]: Failed password for invalid user arul from 51.89.149.190 port 34036 ssh2 Sep 30 07:53:17 new sshd[26526]: Received disconnect from 51.89.149.190: 11: Bye Bye [preauth] Sep 30 08:15:10 new sshd[32593]: Failed password for invalid user User from 51.89.149.190 port 60920 ssh2 Sep 30 08:15:10 new sshd[32593]: Received disconnect from 51.89.149.190: 11: Bye Bye [preauth] Sep 30 08:18:51 new sshd[894]: Failed password for invalid user jules from 51.89.149.190 port 45932 ssh2 Sep 30 08:18:51 new sshd[894]: Received disconnect from 51.89.149.190: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=51.89.149.190 | 2019-09-30 15:08:41 | 
| 118.25.195.244 | attack | SSH Brute-Force attacks | 2019-09-30 15:21:38 | 
| 116.3.53.243 | attackspam | 23/tcp [2019-09-30]1pkt | 2019-09-30 15:22:53 |