City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.12.72.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;208.12.72.199.			IN	A
;; AUTHORITY SECTION:
.			410	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123100 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 18:07:51 CST 2021
;; MSG SIZE  rcvd: 106b'Host 199.72.12.208.in-addr.arpa not found: 2(SERVFAIL)
';; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53
** server can't find 199.72.12.208.in-addr.arpa: SERVFAIL| IP | Type | Details | Datetime | 
|---|---|---|---|
| 70.82.63.78 | attackbotsspam | Feb 17 08:17:43 lukav-desktop sshd\[10188\]: Invalid user csgoserver from 70.82.63.78 Feb 17 08:17:43 lukav-desktop sshd\[10188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.82.63.78 Feb 17 08:17:45 lukav-desktop sshd\[10188\]: Failed password for invalid user csgoserver from 70.82.63.78 port 53782 ssh2 Feb 17 08:19:16 lukav-desktop sshd\[11038\]: Invalid user ubuntu from 70.82.63.78 Feb 17 08:19:16 lukav-desktop sshd\[11038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.82.63.78 | 2020-02-17 14:21:18 | 
| 217.35.75.193 | attackspam | Invalid user user from 217.35.75.193 port 57367 | 2020-02-17 14:21:45 | 
| 103.134.2.32 | attackspam | Automatic report - Port Scan Attack | 2020-02-17 13:50:50 | 
| 107.6.129.66 | attackspambots | SSH login attempts. | 2020-02-17 14:10:19 | 
| 185.66.254.69 | attack | Automatic report - Port Scan Attack | 2020-02-17 13:53:09 | 
| 114.67.75.37 | attackbotsspam | Feb 17 05:59:20 | 2020-02-17 13:54:17 | 
| 200.160.111.124 | attackbots | port scan and connect, tcp 23 (telnet) | 2020-02-17 14:00:25 | 
| 77.111.240.42 | attackspam | SSH login attempts. | 2020-02-17 13:59:59 | 
| 125.209.238.100 | attackbotsspam | SSH login attempts. | 2020-02-17 14:20:15 | 
| 54.37.205.162 | attack | B: f2b ssh aggressive 3x | 2020-02-17 14:24:51 | 
| 134.209.36.155 | attack | SSH login attempts. | 2020-02-17 13:48:23 | 
| 208.80.202.60 | attack | SSH login attempts. | 2020-02-17 14:32:31 | 
| 89.236.112.100 | attackspambots | 02/17/2020-05:59:21.864580 89.236.112.100 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 85 | 2020-02-17 13:56:22 | 
| 221.165.252.143 | attack | Feb 17 05:59:00 | 2020-02-17 14:18:40 | 
| 209.242.224.184 | attackspam | SSH login attempts. | 2020-02-17 14:13:37 |