City: unknown
Region: unknown
Country: Multicast Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.207.72.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;239.207.72.8.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 15:33:25 CST 2025
;; MSG SIZE  rcvd: 105Host 8.72.207.239.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 8.72.207.239.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 116.39.190.101 | attackbotsspam | $f2bV_matches | 2020-09-19 04:48:34 | 
| 72.1.242.131 | attack | Hi, Hi, The IP 72.1.242.131 has just been banned by after 5 attempts against postfix. Here is more information about 72.1.242.131 : ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=72.1.242.131 | 2020-09-19 05:11:17 | 
| 118.89.244.28 | attack | $f2bV_matches | 2020-09-19 04:35:44 | 
| 180.166.117.254 | attack | 2020-09-18T19:28:59.935455hostname sshd[44809]: Failed password for root from 180.166.117.254 port 11213 ssh2 ... | 2020-09-19 05:03:14 | 
| 14.236.203.79 | attackbotsspam | Unauthorized connection attempt from IP address 14.236.203.79 on Port 445(SMB) | 2020-09-19 04:39:30 | 
| 111.89.33.46 | attackspambots | Listed on zen-spamhaus also abuseat.org / proto=6 . srcport=4782 . dstport=23 . (2877) | 2020-09-19 04:33:15 | 
| 200.38.152.242 | attackbotsspam | Unauthorized connection attempt from IP address 200.38.152.242 on Port 445(SMB) | 2020-09-19 04:41:27 | 
| 200.60.11.195 | attackbotsspam | Unauthorized connection attempt from IP address 200.60.11.195 on Port 445(SMB) | 2020-09-19 04:43:47 | 
| 92.40.173.49 | attackbots | Listed on dnsbl-sorbs plus abuseat.org and barracudaCentral / proto=17 . srcport=62578 . dstport=59248 . (2875) | 2020-09-19 04:49:10 | 
| 104.41.131.135 | attackspambots | Blocked by Sophos UTM Network Protection . / / proto=6 . srcport=53323 . dstport=5061 . (2874) | 2020-09-19 04:59:47 | 
| 185.176.27.238 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 9501 proto: tcp cat: Misc Attackbytes: 60 | 2020-09-19 04:59:02 | 
| 95.85.43.241 | attack | 2020-09-18T22:03:14+0200 Failed SSH Authentication/Brute Force Attack. (Server 5) | 2020-09-19 04:42:41 | 
| 170.245.176.18 | attackspambots | Sep 18 05:07:15 nxxxxxxx sshd[16245]: reveeclipse mapping checking getaddrinfo for 170.245.176.18.onbahia.com.br [170.245.176.18] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 18 05:07:15 nxxxxxxx sshd[16245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.176.18 user=r.r Sep 18 05:07:17 nxxxxxxx sshd[16245]: Failed password for r.r from 170.245.176.18 port 45619 ssh2 Sep 18 05:07:17 nxxxxxxx sshd[16245]: Connection closed by 170.245.176.18 [preauth] Sep 18 19:03:07 nxxxxxxx sshd[24125]: reveeclipse mapping checking getaddrinfo for 170.245.176.18.onbahia.com.br [170.245.176.18] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 18 19:03:07 nxxxxxxx sshd[24125]: Invalid user admin from 170.245.176.18 Sep 18 19:03:08 nxxxxxxx sshd[24125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.176.18 Sep 18 19:03:09 nxxxxxxx sshd[24133]: reveeclipse mapping checking getaddrinfo for 170.245.176.18.on........ ------------------------------- | 2020-09-19 04:40:09 | 
| 125.142.85.137 | attackbots | Connection to SSH Honeypot - Detected by HoneypotDB | 2020-09-19 04:44:35 | 
| 139.198.121.63 | attackspambots | Sep 18 19:04:39 rocket sshd[31765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.121.63 Sep 18 19:04:40 rocket sshd[31765]: Failed password for invalid user bk from 139.198.121.63 port 39243 ssh2 ... | 2020-09-19 04:33:59 |