City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.4.3.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.4.3.70.			IN	A
;; AUTHORITY SECTION:
.			177	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123100 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 20:07:03 CST 2021
;; MSG SIZE  rcvd: 102
        Host 70.3.4.21.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 70.3.4.21.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 185.53.88.29 | attackbots | 5060/udp 5060/udp 5060/udp... [2019-06-15/25]10pkt,1pt.(udp)  | 
                    2019-06-25 20:52:06 | 
| 23.129.64.151 | attackspam | 3389BruteforceFW23  | 
                    2019-06-25 21:06:41 | 
| 157.34.109.107 | attackbotsspam | Unauthorized connection attempt from IP address 157.34.109.107 on Port 445(SMB)  | 
                    2019-06-25 21:28:32 | 
| 113.160.200.252 | attackspam | Unauthorized connection attempt from IP address 113.160.200.252 on Port 445(SMB)  | 
                    2019-06-25 20:43:13 | 
| 157.230.234.222 | attackspambots | Jun 25 15:17:20 mail sshd\[28218\]: Invalid user prod from 157.230.234.222 port 49646 Jun 25 15:17:20 mail sshd\[28218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.234.222 Jun 25 15:17:22 mail sshd\[28218\]: Failed password for invalid user prod from 157.230.234.222 port 49646 ssh2 Jun 25 15:18:51 mail sshd\[28386\]: Invalid user operador from 157.230.234.222 port 38348 Jun 25 15:18:51 mail sshd\[28386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.234.222  | 
                    2019-06-25 21:28:10 | 
| 185.173.30.215 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.30.215 Failed password for invalid user af1n from 185.173.30.215 port 55624 ssh2 Invalid user medard from 185.173.30.215 port 60830 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.173.30.215 Failed password for invalid user medard from 185.173.30.215 port 60830 ssh2  | 
                    2019-06-25 21:18:50 | 
| 183.192.242.176 | attack | port scan and connect, tcp 23 (telnet)  | 
                    2019-06-25 20:48:07 | 
| 51.77.63.173 | attackspam | Jun 25 08:33:17 mailserver postfix/smtpd[99972]: connect from smartyps.com[51.77.63.173] Jun 25 08:33:19 mailserver postfix/smtpd[99972]: 36403EB246: client=smartyps.com[51.77.63.173] Jun 25 08:33:19 mailserver postfix/smtpd[99972]: disconnect from smartyps.com[51.77.63.173]  | 
                    2019-06-25 21:21:35 | 
| 128.105.19.4 | attack | Invalid user melev from 128.105.19.4 port 47204  | 
                    2019-06-25 21:11:29 | 
| 197.80.206.100 | attack | 445/tcp 445/tcp 445/tcp... [2019-04-25/06-25]22pkt,1pt.(tcp)  | 
                    2019-06-25 20:57:21 | 
| 190.217.5.178 | attack | Unauthorized connection attempt from IP address 190.217.5.178 on Port 445(SMB)  | 
                    2019-06-25 21:05:36 | 
| 186.118.138.10 | attackbots | 2019-06-25T08:52:13.148031 sshd[5755]: Invalid user csgo from 186.118.138.10 port 52461 2019-06-25T08:52:13.162959 sshd[5755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.118.138.10 2019-06-25T08:52:13.148031 sshd[5755]: Invalid user csgo from 186.118.138.10 port 52461 2019-06-25T08:52:14.329726 sshd[5755]: Failed password for invalid user csgo from 186.118.138.10 port 52461 ssh2 2019-06-25T08:54:30.459915 sshd[5783]: Invalid user apache from 186.118.138.10 port 60584 ...  | 
                    2019-06-25 21:10:27 | 
| 192.241.230.96 | attack | 445/tcp 23/tcp 6379/tcp... [2019-04-24/06-23]50pkt,34pt.(tcp),6pt.(udp)  | 
                    2019-06-25 20:51:04 | 
| 82.221.131.102 | attackspambots | search WP for "forgotten" wp-config backups ... checks for > 50 possible backupfile names  | 
                    2019-06-25 20:40:23 | 
| 190.9.130.159 | attack | v+ssh-bruteforce  | 
                    2019-06-25 21:04:16 |