City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.217.59.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.217.59.104.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:43:16 CST 2025
;; MSG SIZE  rcvd: 107
        Host 104.59.217.242.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 104.59.217.242.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 116.96.224.93 | attack | Unauthorized connection attempt from IP address 116.96.224.93 on Port 445(SMB)  | 
                    2019-10-31 19:45:15 | 
| 185.88.197.15 | attackbotsspam | SSH invalid-user multiple login attempts  | 
                    2019-10-31 19:57:08 | 
| 74.82.47.3 | attackbots | scan r  | 
                    2019-10-31 20:17:01 | 
| 72.164.246.194 | attackbots | Unauthorized connection attempt from IP address 72.164.246.194 on Port 445(SMB)  | 
                    2019-10-31 19:55:15 | 
| 46.101.26.63 | attack | 2019-10-31T06:29:39.192761shield sshd\[12069\]: Invalid user radius from 46.101.26.63 port 43336 2019-10-31T06:29:39.198238shield sshd\[12069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.26.63 2019-10-31T06:29:41.694453shield sshd\[12069\]: Failed password for invalid user radius from 46.101.26.63 port 43336 ssh2 2019-10-31T06:33:28.683157shield sshd\[13759\]: Invalid user mmi from 46.101.26.63 port 34404 2019-10-31T06:33:28.688955shield sshd\[13759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.26.63  | 
                    2019-10-31 19:43:50 | 
| 139.59.41.154 | attack | Tried sshing with brute force.  | 
                    2019-10-31 19:53:21 | 
| 222.186.175.183 | attackspambots | Oct 31 12:25:56 srv01 sshd[15740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Oct 31 12:25:58 srv01 sshd[15740]: Failed password for root from 222.186.175.183 port 27378 ssh2 Oct 31 12:26:02 srv01 sshd[15740]: Failed password for root from 222.186.175.183 port 27378 ssh2 Oct 31 12:25:56 srv01 sshd[15740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Oct 31 12:25:58 srv01 sshd[15740]: Failed password for root from 222.186.175.183 port 27378 ssh2 Oct 31 12:26:02 srv01 sshd[15740]: Failed password for root from 222.186.175.183 port 27378 ssh2 Oct 31 12:25:56 srv01 sshd[15740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Oct 31 12:25:58 srv01 sshd[15740]: Failed password for root from 222.186.175.183 port 27378 ssh2 Oct 31 12:26:02 srv01 sshd[15740]: Failed password for root from ...  | 
                    2019-10-31 19:49:50 | 
| 113.190.93.62 | attack | Unauthorized connection attempt from IP address 113.190.93.62 on Port 445(SMB)  | 
                    2019-10-31 20:07:10 | 
| 78.165.224.237 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/78.165.224.237/ TR - 1H : (80) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : TR NAME ASN : ASN9121 IP : 78.165.224.237 CIDR : 78.165.224.0/19 PREFIX COUNT : 4577 UNIQUE IP COUNT : 6868736 ATTACKS DETECTED ASN9121 : 1H - 3 3H - 6 6H - 16 12H - 32 24H - 56 DateTime : 2019-10-31 04:46:29 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery  | 
                    2019-10-31 19:58:02 | 
| 110.77.194.79 | attack | Unauthorized connection attempt from IP address 110.77.194.79 on Port 445(SMB)  | 
                    2019-10-31 20:03:59 | 
| 123.24.165.162 | attackbotsspam | Unauthorized connection attempt from IP address 123.24.165.162 on Port 445(SMB)  | 
                    2019-10-31 20:01:23 | 
| 178.62.36.116 | attackspambots | 2019-10-31T12:08:39.586219abusebot-8.cloudsearch.cf sshd\[29398\]: Invalid user ubuntu from 178.62.36.116 port 48460  | 
                    2019-10-31 20:19:17 | 
| 138.197.129.38 | attackspambots | $f2bV_matches  | 
                    2019-10-31 19:39:21 | 
| 45.45.45.45 | attack | 31.10.2019 11:08:23 Recursive DNS scan  | 
                    2019-10-31 19:48:16 | 
| 179.178.251.226 | attackbots | Scanning random ports - tries to find possible vulnerable services  | 
                    2019-10-31 19:49:15 |