City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.135.42.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;205.135.42.109.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:45:40 CST 2025
;; MSG SIZE  rcvd: 107Host 109.42.135.205.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 109.42.135.205.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 198.50.200.80 | attackspambots | Jan 23 23:54:18 SilenceServices sshd[2774]: Failed password for root from 198.50.200.80 port 34892 ssh2 Jan 23 23:57:03 SilenceServices sshd[4416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.200.80 Jan 23 23:57:05 SilenceServices sshd[4416]: Failed password for invalid user mohandas from 198.50.200.80 port 36470 ssh2 | 2020-01-24 07:02:21 | 
| 185.143.223.246 | attackbotsspam | firewall-block, port(s): 2225/tcp, 11870/tcp | 2020-01-24 06:48:21 | 
| 176.197.187.142 | attack | firewall-block, port(s): 1433/tcp | 2020-01-24 06:49:35 | 
| 191.243.94.155 | attackspambots | Unauthorized connection attempt from IP address 191.243.94.155 on Port 445(SMB) | 2020-01-24 06:52:43 | 
| 80.211.2.150 | attackbots | Unauthorized connection attempt detected from IP address 80.211.2.150 to port 2220 [J] | 2020-01-24 06:36:12 | 
| 8.209.73.223 | attackbots | $f2bV_matches | 2020-01-24 06:32:16 | 
| 118.31.13.8 | attackbots | Unauthorized connection attempt detected from IP address 118.31.13.8 to port 3306 [J] | 2020-01-24 06:49:01 | 
| 49.88.112.112 | attackspambots | Failed password for root from 49.88.112.112 port 38686 ssh2 Failed password for root from 49.88.112.112 port 38686 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112 user=root Failed password for root from 49.88.112.112 port 55034 ssh2 Failed password for root from 49.88.112.112 port 55034 ssh2 | 2020-01-24 06:46:49 | 
| 129.18.171.210 | attack | Port 1433 Scan | 2020-01-24 07:00:12 | 
| 183.251.83.101 | attackbots | Unauthorized connection attempt detected from IP address 183.251.83.101 to port 1433 [T] | 2020-01-24 06:54:15 | 
| 51.91.158.160 | attackspambots | Invalid user ubnt from 51.91.158.160 port 47246 | 2020-01-24 06:33:40 | 
| 103.20.188.62 | attackbots | Unauthorized connection attempt detected from IP address 103.20.188.62 to port 2220 [J] | 2020-01-24 06:33:17 | 
| 103.27.200.159 | attack | Unauthorized connection attempt detected from IP address 103.27.200.159 to port 2220 [J] | 2020-01-24 06:44:07 | 
| 190.40.194.58 | attack | Honeypot attack, port: 445, PTR: PTR record not found | 2020-01-24 06:47:55 | 
| 202.146.219.51 | attack | Unauthorized connection attempt detected from IP address 202.146.219.51 to port 1433 [J] | 2020-01-24 06:40:07 |