City: unknown
Region: unknown
Country: Multicast Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 232.12.66.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;232.12.66.149.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:19:42 CST 2025
;; MSG SIZE  rcvd: 106
        Host 149.66.12.232.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 149.66.12.232.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 63.218.57.50 | attack | Unauthorized connection attempt from IP address 63.218.57.50 on Port 445(SMB)  | 
                    2020-02-22 04:08:33 | 
| 190.98.128.218 | attack | scan z  | 
                    2020-02-22 04:12:22 | 
| 212.34.148.230 | attack | Brute force attempt  | 
                    2020-02-22 03:56:38 | 
| 111.67.195.106 | attackbotsspam | Feb 21 14:46:11 ws22vmsma01 sshd[70292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.195.106 Feb 21 14:46:13 ws22vmsma01 sshd[70292]: Failed password for invalid user dennis from 111.67.195.106 port 37230 ssh2 ...  | 
                    2020-02-22 03:56:08 | 
| 210.131.0.50 | spam | info@jackrabbit.co.nz which send to : http://www.superpuperr.blogspot.com/p9okhbhjbrftfp9okgvkjn => Google => Yahoo => Yeah etc. => abusecomplaints@markmonitor.com Message-ID: <0602d3e3e8c316e5c63442111acef24e6de0e44e91@jackrabbit.co.nz> => 210.131.0.50 jackrabbit.co.nz => 104.18.55.251 210.131.0.50 => hostmaster@nic.ad.jp https://en.asytech.cn/report-ip/210.131.0.50 nifty.com => tech-contact@nifty.ad.jp, nifty-admin@list.nifty.co.jp, nifty-tec@list.nifty.co.jp, gtld-abuse@jprs.jp https://www.mywot.com/scorecard/bizmail.nifty.com https://www.mywot.com/scorecard/nifty.com nifty.com => 222.158.213.148  | 
                    2020-02-22 04:07:48 | 
| 139.59.32.156 | attackbots | Feb 21 16:03:22 ws12vmsma01 sshd[7041]: Invalid user hadoop from 139.59.32.156 Feb 21 16:03:24 ws12vmsma01 sshd[7041]: Failed password for invalid user hadoop from 139.59.32.156 port 54498 ssh2 Feb 21 16:08:48 ws12vmsma01 sshd[7837]: Invalid user gitlab-runner from 139.59.32.156 ...  | 
                    2020-02-22 03:51:01 | 
| 185.151.242.185 | attack | Port scan: Attack repeated for 24 hours  | 
                    2020-02-22 03:54:35 | 
| 125.26.208.140 | attack | Unauthorized connection attempt from IP address 125.26.208.140 on Port 445(SMB)  | 
                    2020-02-22 03:43:04 | 
| 58.187.168.132 | attackspambots | 1582290703 - 02/21/2020 14:11:43 Host: 58.187.168.132/58.187.168.132 Port: 445 TCP Blocked  | 
                    2020-02-22 04:17:31 | 
| 197.55.170.229 | attackspambots | Fri Feb 21 06:12:30 2020 - Child process 123444 handling connection Fri Feb 21 06:12:30 2020 - New connection from: 197.55.170.229:33368 Fri Feb 21 06:12:30 2020 - Sending data to client: [Login: ] Fri Feb 21 06:13:00 2020 - Child aborting Fri Feb 21 06:13:00 2020 - Reporting IP address: 197.55.170.229 - mflag: 0  | 
                    2020-02-22 03:42:37 | 
| 180.252.232.192 | attackspam | Unauthorized connection attempt from IP address 180.252.232.192 on Port 445(SMB)  | 
                    2020-02-22 04:06:44 | 
| 49.88.112.116 | attackbots | Feb 21 20:47:44 localhost sshd\[12862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116 user=root Feb 21 20:47:46 localhost sshd\[12862\]: Failed password for root from 49.88.112.116 port 27398 ssh2 Feb 21 20:47:48 localhost sshd\[12862\]: Failed password for root from 49.88.112.116 port 27398 ssh2  | 
                    2020-02-22 03:51:30 | 
| 36.92.189.194 | attack | Unauthorized connection attempt from IP address 36.92.189.194 on Port 445(SMB)  | 
                    2020-02-22 04:05:32 | 
| 117.50.1.12 | attack | Feb 21 10:51:58 plusreed sshd[8948]: Invalid user liuzezhang from 117.50.1.12 ...  | 
                    2020-02-22 04:04:22 | 
| 106.51.53.160 | attack | Unauthorized connection attempt from IP address 106.51.53.160 on Port 445(SMB)  | 
                    2020-02-22 03:48:22 |