City: unknown
Region: unknown
Country: Multicast Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.180.244.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;239.180.244.89.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 18:37:53 CST 2025
;; MSG SIZE  rcvd: 107
        Host 89.244.180.239.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 89.244.180.239.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 177.42.137.53 | attack | $f2bV_matches  | 
                    2020-06-30 21:19:06 | 
| 123.240.21.252 | attack | 20/6/30@08:24:14: FAIL: Alarm-Telnet address from=123.240.21.252 ...  | 
                    2020-06-30 21:49:53 | 
| 203.151.146.216 | attackspambots | Tried sshing with brute force.  | 
                    2020-06-30 21:58:13 | 
| 112.85.42.89 | attackbots | Jun 30 18:52:18 dhoomketu sshd[1158012]: Failed password for root from 112.85.42.89 port 52519 ssh2 Jun 30 18:54:12 dhoomketu sshd[1158047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89 user=root Jun 30 18:54:14 dhoomketu sshd[1158047]: Failed password for root from 112.85.42.89 port 40472 ssh2 Jun 30 18:57:12 dhoomketu sshd[1158101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89 user=root Jun 30 18:57:14 dhoomketu sshd[1158101]: Failed password for root from 112.85.42.89 port 27745 ssh2 ...  | 
                    2020-06-30 21:50:35 | 
| 45.144.36.61 | attack | HACKED MY STEAM ACCOUNT  | 
                    2020-06-30 21:33:49 | 
| 117.50.36.137 | attack | $f2bV_matches  | 
                    2020-06-30 21:57:32 | 
| 156.96.56.176 | attackbotsspam | bruteforce detected  | 
                    2020-06-30 21:16:37 | 
| 68.183.124.34 | attackspam | Fail2Ban Ban Triggered (2)  | 
                    2020-06-30 22:04:38 | 
| 159.65.30.66 | attackbotsspam | prod8 ...  | 
                    2020-06-30 21:26:14 | 
| 51.91.157.101 | attack | Jun 30 14:26:34 serwer sshd\[25378\]: Invalid user zzg from 51.91.157.101 port 45872 Jun 30 14:26:34 serwer sshd\[25378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.101 Jun 30 14:26:36 serwer sshd\[25378\]: Failed password for invalid user zzg from 51.91.157.101 port 45872 ssh2 ...  | 
                    2020-06-30 21:30:57 | 
| 77.42.80.97 | attack | Automatic report - Port Scan Attack  | 
                    2020-06-30 21:26:54 | 
| 51.159.95.255 | attack | DDoS / Bruteforce — port 5060 (SIP) 2020-06-30 18:07:45.018597 [WARNING] sofia_reg.c:2906 Can't find user [3998@0.0.0.0] from 51.159.95.255 2020-06-30 18:07:46.537768 [WARNING] sofia_reg.c:2906 Can't find user [209@0.0.0.0] from 51.159.95.255 2020-06-30 18:07:53.838949 [WARNING] sofia_reg.c:2906 Can't find user [246@0.0.0.0] from 51.159.95.255 2020-06-30 18:07:54.008890 [WARNING] sofia_reg.c:2906 Can't find user [329@0.0.0.0] from 51.159.95.255 2020-06-30 18:07:54.818148 [WARNING] sofia_reg.c:2906 Can't find user [41@0.0.0.0] from 51.159.95.255 2020-06-30 18:07:56.018226 [WARNING] sofia_reg.c:2906 Can't find user [5678@0.0.0.0] from 51.159.95.255 2020-06-30 18:08:00.788254 [WARNING] sofia_reg.c:2906 Can't find user [135@0.0.0.0] from 51.159.95.255 2020-06-30 18:08:03.308854 [WARNING] sofia_reg.c:2906 Can't find user [6971@0.0.0.0] from 51.159.95.255 2020-06-30 18:08:07.229374 [WARNING] sofia_reg.c:2906 Can't find user [7795@0.0.0.0] from 51.159.95.255  | 
                    2020-06-30 21:43:59 | 
| 202.134.150.153 | attackspambots | Automatic report - XMLRPC Attack  | 
                    2020-06-30 21:31:22 | 
| 122.181.16.134 | attackspam | Jun 30 14:45:39 xeon sshd[52664]: Failed password for invalid user teamspeak3 from 122.181.16.134 port 45097 ssh2  | 
                    2020-06-30 21:26:32 | 
| 104.155.213.9 | attackspam | 5x Failed Password  | 
                    2020-06-30 21:25:55 |