City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2408:8722:8100:1:44::
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 16760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2408:8722:8100:1:44::.		IN	A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Feb 19 02:59:24 CST 2022
;; MSG SIZE  rcvd: 50
'
        Host 0.0.0.0.0.0.0.0.0.0.0.0.4.4.0.0.1.0.0.0.0.0.1.8.2.2.7.8.8.0.4.2.ip6.arpa not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 0.0.0.0.0.0.0.0.0.0.0.0.4.4.0.0.1.0.0.0.0.0.1.8.2.2.7.8.8.0.4.2.ip6.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 89.34.27.104 | attack | 3702/udp 19/udp 1900/udp... [2020-07-03/05]28pkt,8pt.(udp)  | 
                    2020-07-05 23:05:45 | 
| 185.39.10.66 | attackspam | 07/05/2020-08:28:39.468048 185.39.10.66 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-07-05 22:32:29 | 
| 185.39.11.56 | attack | 
  | 
                    2020-07-05 22:53:54 | 
| 92.63.196.25 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 85 - port: 50891 proto: TCP cat: Misc Attack  | 
                    2020-07-05 22:40:14 | 
| 43.226.152.76 | attack | Unauthorized connection attempt detected from IP address 43.226.152.76 to port 445  | 
                    2020-07-05 22:48:36 | 
| 94.102.51.17 | attack | Automatic report - Port Scan  | 
                    2020-07-05 23:00:23 | 
| 82.221.105.7 | attackbotsspam | 
  | 
                    2020-07-05 22:42:51 | 
| 185.39.10.65 | attack | firewall-block, port(s): 22202/tcp, 22233/tcp, 22242/tcp, 22260/tcp, 22272/tcp, 22274/tcp, 22299/tcp, 22396/tcp  | 
                    2020-07-05 22:32:47 | 
| 218.29.188.14 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-07-05 22:50:29 | 
| 94.102.51.58 | attackspam | Jul 5 16:42:54 debian-2gb-nbg1-2 kernel: \[16218787.780085\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.58 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=39653 PROTO=TCP SPT=41798 DPT=55544 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-07-05 22:59:28 | 
| 183.237.81.181 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-07-05 22:34:34 | 
| 92.63.196.28 | attackbots | 07/05/2020-10:09:16.587598 92.63.196.28 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-07-05 22:39:52 | 
| 150.109.99.68 | attackbotsspam | Jul 5 16:31:48 PorscheCustomer sshd[7730]: Failed password for root from 150.109.99.68 port 45100 ssh2 Jul 5 16:34:11 PorscheCustomer sshd[7774]: Failed password for postgres from 150.109.99.68 port 33504 ssh2 ...  | 
                    2020-07-05 22:57:01 | 
| 185.39.11.50 | attackspambots | 07/05/2020-09:40:17.552086 185.39.11.50 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-07-05 22:54:27 | 
| 125.117.96.125 | attackbotsspam | Unauthorized connection attempt detected from IP address 125.117.96.125 to port 445  | 
                    2020-07-05 22:36:29 |