City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.251.234.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;211.251.234.225.		IN	A
;; AUTHORITY SECTION:
.			286	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:27:05 CST 2022
;; MSG SIZE  rcvd: 108
        Host 225.234.251.211.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 225.234.251.211.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 190.16.159.223 | attackbotsspam | Auto Detect Rule! proto TCP (SYN), 190.16.159.223:26785->gjan.info:23, len 40  | 
                    2020-07-24 00:45:08 | 
| 209.127.127.5 | attack | (From jessika.bean@yahoo.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com  | 
                    2020-07-24 00:13:44 | 
| 157.245.104.19 | attackspambots | leo_www  | 
                    2020-07-24 00:28:38 | 
| 125.227.236.60 | attackspam | [SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.  | 
                    2020-07-24 00:52:00 | 
| 14.248.96.35 | attackbotsspam | Unauthorized connection attempt from IP address 14.248.96.35 on Port 445(SMB)  | 
                    2020-07-24 00:35:17 | 
| 37.59.37.69 | attackspambots | Jul 23 18:56:11 lunarastro sshd[862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.37.69 Jul 23 18:56:13 lunarastro sshd[862]: Failed password for invalid user ftpuser from 37.59.37.69 port 55557 ssh2  | 
                    2020-07-24 00:24:22 | 
| 193.227.5.24 | attackspam | Unauthorized connection attempt from IP address 193.227.5.24 on Port 445(SMB)  | 
                    2020-07-24 00:45:52 | 
| 177.223.169.223 | attackspambots | Jul 23 08:58:25 ws12vmsma01 sshd[37730]: Invalid user pibid from 177.223.169.223 Jul 23 08:58:27 ws12vmsma01 sshd[37730]: Failed password for invalid user pibid from 177.223.169.223 port 61425 ssh2 Jul 23 08:59:02 ws12vmsma01 sshd[38157]: Invalid user pibid from 177.223.169.223 ...  | 
                    2020-07-24 00:28:13 | 
| 87.226.213.255 | attackspambots | Unauthorized connection attempt from IP address 87.226.213.255 on Port 445(SMB)  | 
                    2020-07-24 00:40:05 | 
| 106.75.28.38 | attack | Jul 23 10:27:48 server1 sshd\[12503\]: Invalid user ambika from 106.75.28.38 Jul 23 10:27:48 server1 sshd\[12503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.28.38 Jul 23 10:27:49 server1 sshd\[12503\]: Failed password for invalid user ambika from 106.75.28.38 port 35669 ssh2 Jul 23 10:30:58 server1 sshd\[13399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.28.38 user=ubuntu Jul 23 10:31:00 server1 sshd\[13399\]: Failed password for ubuntu from 106.75.28.38 port 53494 ssh2 ...  | 
                    2020-07-24 00:47:22 | 
| 103.18.79.58 | attack | Triggered by Fail2Ban at Ares web server  | 
                    2020-07-24 00:25:42 | 
| 68.64.228.251 | attackbots | Unauthorized connection attempt from IP address 68.64.228.251 on Port 445(SMB)  | 
                    2020-07-24 00:50:08 | 
| 51.255.77.78 | attackspambots | Jul 23 11:13:44 ws19vmsma01 sshd[166718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.77.78 Jul 23 11:13:46 ws19vmsma01 sshd[166718]: Failed password for invalid user admin from 51.255.77.78 port 58642 ssh2 ...  | 
                    2020-07-24 00:27:33 | 
| 179.63.195.124 | attack | Auto Detect Rule! proto TCP (SYN), 179.63.195.124:30947->gjan.info:23, len 40  | 
                    2020-07-24 00:42:16 | 
| 5.196.158.24 | attack | Auto Detect Rule! proto TCP (SYN), 5.196.158.24:51179->gjan.info:1433, len 40  | 
                    2020-07-24 00:41:16 |