City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.174.43.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41809
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.174.43.42.			IN	A
;; AUTHORITY SECTION:
.			244	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:50:57 CST 2022
;; MSG SIZE  rcvd: 106
        Host 42.43.174.214.in-addr.arpa not found: 2(SERVFAIL)
        server can't find 214.174.43.42.in-addr.arpa: SERVFAIL
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 128.199.88.188 | attack | Nov 1 18:16:16 ny01 sshd[10285]: Failed password for root from 128.199.88.188 port 50198 ssh2 Nov 1 18:20:23 ny01 sshd[10709]: Failed password for root from 128.199.88.188 port 42029 ssh2  | 
                    2019-11-02 06:25:57 | 
| 103.75.226.25 | attackspambots | proto=tcp . spt=40263 . dpt=25 . (Found on Dark List de Nov 01) (672)  | 
                    2019-11-02 06:10:54 | 
| 51.77.140.111 | attackspam | Nov 1 22:51:16 legacy sshd[4317]: Failed password for root from 51.77.140.111 port 52978 ssh2 Nov 1 22:55:06 legacy sshd[4398]: Failed password for root from 51.77.140.111 port 38812 ssh2 Nov 1 22:58:58 legacy sshd[4599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111 ...  | 
                    2019-11-02 06:02:13 | 
| 117.119.84.34 | attackbots | Nov 1 21:17:51 Ubuntu-1404-trusty-64-minimal sshd\[13403\]: Invalid user jj from 117.119.84.34 Nov 1 21:17:51 Ubuntu-1404-trusty-64-minimal sshd\[13403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34 Nov 1 21:17:52 Ubuntu-1404-trusty-64-minimal sshd\[13403\]: Failed password for invalid user jj from 117.119.84.34 port 42253 ssh2 Nov 1 21:26:43 Ubuntu-1404-trusty-64-minimal sshd\[21277\]: Invalid user jj from 117.119.84.34 Nov 1 21:26:43 Ubuntu-1404-trusty-64-minimal sshd\[21277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34  | 
                    2019-11-02 06:09:16 | 
| 85.126.97.144 | attackbots | Automatic report - Port Scan Attack  | 
                    2019-11-02 06:13:11 | 
| 85.173.126.65 | attackbotsspam | Chat Spam  | 
                    2019-11-02 06:14:34 | 
| 165.231.248.59 | attackbotsspam | Automatic report - Banned IP Access  | 
                    2019-11-02 06:11:33 | 
| 200.216.31.148 | attackspambots | Connection by 200.216.31.148 on port: 5900 got caught by honeypot at 11/1/2019 10:20:05 PM  | 
                    2019-11-02 06:26:45 | 
| 54.37.129.235 | attack | Nov 1 22:43:48 SilenceServices sshd[2650]: Failed password for root from 54.37.129.235 port 43194 ssh2 Nov 1 22:47:28 SilenceServices sshd[6887]: Failed password for root from 54.37.129.235 port 54958 ssh2  | 
                    2019-11-02 05:57:30 | 
| 157.230.239.99 | attackbots | Brute force SMTP login attempted. ...  | 
                    2019-11-02 06:09:40 | 
| 157.245.112.184 | attack | 157.245.112.184 - - \[01/Nov/2019:21:14:05 +0100\] "GET / HTTP/1.0" 301 178 "-" "Mozilla/5.0 \(compatible\; NetcraftSurveyAgent/1.0\; +info@netcraft.com\)" ...  | 
                    2019-11-02 06:14:16 | 
| 115.79.60.104 | attackspambots | Nov 1 21:13:50 serwer sshd\[9949\]: Invalid user temp from 115.79.60.104 port 55162 Nov 1 21:13:50 serwer sshd\[9949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.60.104 Nov 1 21:13:52 serwer sshd\[9949\]: Failed password for invalid user temp from 115.79.60.104 port 55162 ssh2 ...  | 
                    2019-11-02 06:26:13 | 
| 84.19.190.178 | attackspambots | Automatic report - XMLRPC Attack  | 
                    2019-11-02 06:05:42 | 
| 63.240.240.74 | attackbotsspam | Nov 1 15:19:55 mockhub sshd[28110]: Failed password for root from 63.240.240.74 port 38085 ssh2 ...  | 
                    2019-11-02 06:24:41 | 
| 94.62.95.163 | attack | proto=tcp . spt=48951 . dpt=25 . (Found on Blocklist de Nov 01) (676)  | 
                    2019-11-02 06:00:24 |