City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:8e0:40:304::8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 55180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:8e0:40:304::8.		IN	A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Feb 19 00:36:00 CST 2022
;; MSG SIZE  rcvd: 47
'
        8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.4.0.3.0.0.4.0.0.0.e.8.0.1.0.0.2.ip6.arpa domain name pointer saga.iway.ch.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.4.0.3.0.0.4.0.0.0.e.8.0.1.0.0.2.ip6.arpa	name = saga.iway.ch.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 222.186.52.124 | attackspam | Aug 14 01:17:15 * sshd[7088]: Failed password for root from 222.186.52.124 port 22527 ssh2  | 
                    2019-08-14 07:32:34 | 
| 216.218.206.119 | attackbotsspam | firewall-block, port(s): 2323/tcp  | 
                    2019-08-14 07:31:28 | 
| 192.160.102.169 | attackspam | detected by Fail2Ban  | 
                    2019-08-14 07:00:31 | 
| 103.36.84.180 | attackbotsspam | Aug 13 23:50:27 areeb-Workstation sshd\[21721\]: Invalid user cxh from 103.36.84.180 Aug 13 23:50:27 areeb-Workstation sshd\[21721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.180 Aug 13 23:50:29 areeb-Workstation sshd\[21721\]: Failed password for invalid user cxh from 103.36.84.180 port 52282 ssh2 ...  | 
                    2019-08-14 07:30:21 | 
| 118.24.173.104 | attack | SSH invalid-user multiple login attempts  | 
                    2019-08-14 07:30:36 | 
| 192.207.205.98 | attack | leo_www  | 
                    2019-08-14 07:21:36 | 
| 106.75.55.123 | attackspambots | Fail2Ban - SSH Bruteforce Attempt  | 
                    2019-08-14 07:00:54 | 
| 84.236.3.70 | attackbotsspam | Aug 13 21:54:20 server sshd[33295]: Failed password for invalid user admin from 84.236.3.70 port 50662 ssh2 Aug 13 21:56:45 server sshd[33516]: Failed password for invalid user ubuntu from 84.236.3.70 port 51308 ssh2 Aug 13 21:59:11 server sshd[33718]: Failed password for invalid user ubnt from 84.236.3.70 port 51962 ssh2  | 
                    2019-08-14 07:35:34 | 
| 54.153.92.42 | attackbots | [portscan] Port scan  | 
                    2019-08-14 07:16:49 | 
| 54.38.219.198 | attackspam | Spam  | 
                    2019-08-14 06:59:07 | 
| 81.241.235.191 | attackspam | 2019-08-13T20:21:01.402775stark.klein-stark.info sshd\[9262\]: Invalid user mahendra from 81.241.235.191 port 59590 2019-08-13T20:21:01.406649stark.klein-stark.info sshd\[9262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235-241-81.adsl-static.isp.belgacom.be 2019-08-13T20:21:03.459602stark.klein-stark.info sshd\[9262\]: Failed password for invalid user mahendra from 81.241.235.191 port 59590 ssh2 ...  | 
                    2019-08-14 07:09:30 | 
| 142.44.218.192 | attackspambots | 2019-08-13T22:50:26.776375abusebot-2.cloudsearch.cf sshd\[14508\]: Invalid user minecraft from 142.44.218.192 port 58796  | 
                    2019-08-14 07:04:41 | 
| 177.44.25.220 | attackbots | $f2bV_matches  | 
                    2019-08-14 07:03:52 | 
| 49.83.144.54 | attackbotsspam | Automatic report - Port Scan Attack  | 
                    2019-08-14 07:18:34 | 
| 45.58.139.104 | attackbots | Spam  | 
                    2019-08-14 07:38:07 |