City: unknown
Region: unknown
Country: Multicast Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 228.134.58.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16330
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;228.134.58.21.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 23:55:39 CST 2025
;; MSG SIZE  rcvd: 106
        Host 21.58.134.228.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 21.58.134.228.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 222.186.169.192 | attackspam | Jan 31 08:53:00 NPSTNNYC01T sshd[8421]: Failed password for root from 222.186.169.192 port 16764 ssh2 Jan 31 08:53:13 NPSTNNYC01T sshd[8421]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 16764 ssh2 [preauth] Jan 31 08:53:20 NPSTNNYC01T sshd[8425]: Failed password for root from 222.186.169.192 port 29840 ssh2 ...  | 
                    2020-01-31 21:59:51 | 
| 218.92.0.202 | attackbotsspam | Jan 31 14:14:53 MK-Soft-Root1 sshd[16232]: Failed password for root from 218.92.0.202 port 45649 ssh2 Jan 31 14:14:56 MK-Soft-Root1 sshd[16232]: Failed password for root from 218.92.0.202 port 45649 ssh2 ...  | 
                    2020-01-31 21:54:13 | 
| 203.252.139.180 | attack | 2020-01-31T10:52:17.700282scmdmz1 sshd[16292]: Invalid user luca from 203.252.139.180 port 52784 2020-01-31T10:52:17.703146scmdmz1 sshd[16292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=nplc.konkuk.ac.kr 2020-01-31T10:52:17.700282scmdmz1 sshd[16292]: Invalid user luca from 203.252.139.180 port 52784 2020-01-31T10:52:19.461812scmdmz1 sshd[16292]: Failed password for invalid user luca from 203.252.139.180 port 52784 ssh2 2020-01-31T10:55:27.465694scmdmz1 sshd[16657]: Invalid user raghuveer from 203.252.139.180 port 52456 ...  | 
                    2020-01-31 22:09:04 | 
| 51.68.230.54 | attackbots | $f2bV_matches  | 
                    2020-01-31 22:05:29 | 
| 188.166.216.84 | attackspam | Jan 31 02:42:29 askasleikir sshd[65082]: Failed password for invalid user applmgr from 188.166.216.84 port 33861 ssh2  | 
                    2020-01-31 21:52:23 | 
| 180.241.47.156 | attackspam | Unauthorized connection attempt from IP address 180.241.47.156 on Port 445(SMB)  | 
                    2020-01-31 21:32:04 | 
| 42.114.206.19 | attack | Unauthorized connection attempt from IP address 42.114.206.19 on Port 445(SMB)  | 
                    2020-01-31 21:49:06 | 
| 157.44.255.79 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 31-01-2020 08:45:18.  | 
                    2020-01-31 21:34:52 | 
| 91.74.234.154 | attackbots | Jan 31 13:57:58 lnxded64 sshd[18047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.74.234.154  | 
                    2020-01-31 21:48:30 | 
| 187.49.83.194 | attackspam | Unauthorized connection attempt detected from IP address 187.49.83.194 to port 445  | 
                    2020-01-31 22:03:46 | 
| 103.84.88.35 | attack | PHP DIESCAN Information Disclosure Vulnerability  | 
                    2020-01-31 21:38:01 | 
| 72.43.18.210 | attack | TCP Port Scanning  | 
                    2020-01-31 21:32:23 | 
| 188.229.82.153 | attackspambots | Unauthorized connection attempt from IP address 188.229.82.153 on Port 445(SMB)  | 
                    2020-01-31 21:47:02 | 
| 49.234.99.246 | attack | 2020-01-31T13:55:41.046631ns386461 sshd\[22803\]: Invalid user omprakash from 49.234.99.246 port 55336 2020-01-31T13:55:41.051143ns386461 sshd\[22803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.99.246 2020-01-31T13:55:43.086586ns386461 sshd\[22803\]: Failed password for invalid user omprakash from 49.234.99.246 port 55336 ssh2 2020-01-31T14:01:37.197672ns386461 sshd\[27961\]: Invalid user ulka from 49.234.99.246 port 59860 2020-01-31T14:01:37.202206ns386461 sshd\[27961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.99.246 ...  | 
                    2020-01-31 21:53:53 | 
| 165.22.61.82 | attack | Unauthorized connection attempt detected from IP address 165.22.61.82 to port 2220 [J]  | 
                    2020-01-31 21:47:21 |