City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.32.160.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64649
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;211.32.160.63.			IN	A
;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:27:11 CST 2022
;; MSG SIZE  rcvd: 106
        b';; connection timed out; no servers could be reached
'
        b';; Truncated, retrying in TCP mode.
63.160.32.211.in-addr.arpa	name = mosaic.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = portal.sc.co.kr.
63.160.32.211.in-addr.arpa	name = sc.co.kr.
63.160.32.211.in-addr.arpa	name = rewardsmall.sc.co.kr.
63.160.32.211.in-addr.arpa	name = priority.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = product.sc.co.kr.
63.160.32.211.in-addr.arpa	name = invoice.sc.co.kr.
63.160.32.211.in-addr.arpa	name = cardproduct.sc.co.kr.
63.160.32.211.in-addr.arpa	name = priority.sc.co.kr.
63.160.32.211.in-addr.arpa	name = standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = face.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = international.scfirstbank.com.
63.160.32.211.in-addr.arpa	name = loanproduct.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = loanproduct.sc.co.kr.
63.160.32.211.in-addr.arpa	name = rewardsmall.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = depositproduct.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = mosaic.sc.co.kr.
63.160.32.211.in-addr.arpa	name = international.sc.co.kr.
63.160.32.211.in-addr.arpa	name = prb.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = prb.scfirstbank.com.
63.160.32.211.in-addr.arpa	name = priority.scfirstbank.com.
63.160.32.211.in-addr.arpa	name = scfirstbank.com.
63.160.32.211.in-addr.arpa	name = cardproduct.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = selfbank.co.kr.
63.160.32.211.in-addr.arpa	name = international.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = portal.scfirstbank.com.
63.160.32.211.in-addr.arpa	name = koreabreeze.co.kr.
63.160.32.211.in-addr.arpa	name = mosaic.scfirstbank.com.
63.160.32.211.in-addr.arpa	name = portal.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = product.standardchartered.co.kr.
63.160.32.211.in-addr.arpa	name = prb.sc.co.kr.
63.160.32.211.in-addr.arpa	name = depositproduct.sc.co.kr.
Authoritative answers can be found from:
'
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 206.189.156.198 | attackbots | $f2bV_matches  | 
                    2020-08-07 07:27:25 | 
| 185.246.128.161 | attack | Aug 6 23:53:50 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=185.246.128.161 DST=79.143.186.54 LEN=60 TOS=0x00 PREC=0x00 TTL=57 ID=29012 DF PROTO=TCP SPT=38720 DPT=2082 WINDOW=14600 RES=0x00 SYN URGP=0 Aug 6 23:53:51 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=185.246.128.161 DST=79.143.186.54 LEN=60 TOS=0x00 PREC=0x00 TTL=57 ID=29013 DF PROTO=TCP SPT=38720 DPT=2082 WINDOW=14600 RES=0x00 SYN URGP=0 Aug 6 23:53:53 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=185.246.128.161 DST=79.143.186.54 LEN=60 TOS=0x00 PREC=0x00 TTL=57 ID=29014 DF PROTO=TCP SPT=38720 DPT=2082 WINDOW=14600 RES=0x00 SYN URGP=0  | 
                    2020-08-07 07:20:57 | 
| 211.137.254.221 | attackspam | Aug 6 16:10:47 propaganda sshd[94680]: Connection from 211.137.254.221 port 47326 on 10.0.0.160 port 22 rdomain "" Aug 6 16:10:47 propaganda sshd[94680]: Connection closed by 211.137.254.221 port 47326 [preauth]  | 
                    2020-08-07 07:36:38 | 
| 91.121.164.188 | attackbotsspam | k+ssh-bruteforce  | 
                    2020-08-07 07:26:36 | 
| 145.239.7.56 | attackbots | Aug 6 23:54:03 eventyay sshd[19043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.7.56 Aug 6 23:54:05 eventyay sshd[19043]: Failed password for invalid user admin from 145.239.7.56 port 35226 ssh2 Aug 6 23:54:06 eventyay sshd[19045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.7.56 ...  | 
                    2020-08-07 07:09:36 | 
| 222.186.173.183 | attackbotsspam | Aug 6 20:19:36 vps46666688 sshd[29679]: Failed password for root from 222.186.173.183 port 56352 ssh2 Aug 6 20:19:48 vps46666688 sshd[29679]: Failed password for root from 222.186.173.183 port 56352 ssh2 Aug 6 20:19:48 vps46666688 sshd[29679]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 56352 ssh2 [preauth] ...  | 
                    2020-08-07 07:21:23 | 
| 222.186.180.6 | attackbots | Aug 6 20:22:47 firewall sshd[28309]: Failed password for root from 222.186.180.6 port 58662 ssh2 Aug 6 20:22:51 firewall sshd[28309]: Failed password for root from 222.186.180.6 port 58662 ssh2 Aug 6 20:22:55 firewall sshd[28309]: Failed password for root from 222.186.180.6 port 58662 ssh2 ...  | 
                    2020-08-07 07:34:05 | 
| 222.186.173.238 | attackspam | Aug 7 01:20:05 cosmoit sshd[10491]: Failed password for root from 222.186.173.238 port 35426 ssh2  | 
                    2020-08-07 07:22:03 | 
| 195.144.21.56 | attackspam | Port Scan/VNC login attempt ...  | 
                    2020-08-07 07:07:45 | 
| 159.224.225.228 | attackspam | Automatic report - Banned IP Access  | 
                    2020-08-07 07:13:53 | 
| 177.222.133.100 | attackbotsspam | Automatic report - Port Scan Attack  | 
                    2020-08-07 07:30:51 | 
| 142.93.173.214 | attackspambots | Aug 6 16:04:50 mockhub sshd[14290]: Failed password for root from 142.93.173.214 port 45210 ssh2 ...  | 
                    2020-08-07 07:31:12 | 
| 111.229.78.199 | attackbots | 2020-08-06T23:48:33.851304amanda2.illicoweb.com sshd\[16995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.199 user=root 2020-08-06T23:48:36.206272amanda2.illicoweb.com sshd\[16995\]: Failed password for root from 111.229.78.199 port 39346 ssh2 2020-08-06T23:51:38.264050amanda2.illicoweb.com sshd\[17454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.199 user=root 2020-08-06T23:51:40.684011amanda2.illicoweb.com sshd\[17454\]: Failed password for root from 111.229.78.199 port 37554 ssh2 2020-08-06T23:53:40.979519amanda2.illicoweb.com sshd\[17893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.199 user=root ...  | 
                    2020-08-07 07:28:34 | 
| 207.46.13.153 | attackspam | Automatic report - Banned IP Access  | 
                    2020-08-07 07:39:44 | 
| 185.220.101.1 | attackspam | Aug 6 23:53:42 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=185.220.101.1 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=37959 DF PROTO=TCP SPT=28530 DPT=2082 WINDOW=42340 RES=0x00 SYN URGP=0 Aug 6 23:53:43 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=185.220.101.1 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=37960 DF PROTO=TCP SPT=28530 DPT=2082 WINDOW=42340 RES=0x00 SYN URGP=0 Aug 6 23:53:45 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=185.220.101.1 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=37961 DF PROTO=TCP SPT=28530 DPT=2082 WINDOW=42340 RES=0x00 SYN URGP=0  | 
                    2020-08-07 07:25:06 |