City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.63.51.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.63.51.59.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:38:25 CST 2025
;; MSG SIZE  rcvd: 105
        Host 59.51.63.242.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 59.51.63.242.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 185.215.232.111 | attackspam | 23/tcp [2019-06-26]1pkt  | 
                    2019-06-26 19:45:21 | 
| 165.227.210.71 | attack | [ssh] SSH attack  | 
                    2019-06-26 20:20:00 | 
| 178.93.48.131 | attack | 8080/tcp [2019-06-26]1pkt  | 
                    2019-06-26 20:21:34 | 
| 197.89.57.238 | attackspambots | Unauthorized connection attempt from IP address 197.89.57.238 on Port 445(SMB)  | 
                    2019-06-26 19:54:53 | 
| 14.247.3.155 | attackspam | Unauthorized connection attempt from IP address 14.247.3.155 on Port 445(SMB)  | 
                    2019-06-26 19:36:54 | 
| 85.238.106.240 | attackspambots | Unauthorized connection attempt from IP address 85.238.106.240 on Port 445(SMB)  | 
                    2019-06-26 20:21:11 | 
| 106.12.87.178 | attackbotsspam | Mar 12 23:02:25 vtv3 sshd\[31777\]: Invalid user user01 from 106.12.87.178 port 38108 Mar 12 23:02:25 vtv3 sshd\[31777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.87.178 Mar 12 23:02:27 vtv3 sshd\[31777\]: Failed password for invalid user user01 from 106.12.87.178 port 38108 ssh2 Mar 12 23:11:17 vtv3 sshd\[3010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.87.178 user=root Mar 12 23:11:20 vtv3 sshd\[3010\]: Failed password for root from 106.12.87.178 port 45694 ssh2 Apr 9 13:04:11 vtv3 sshd\[17977\]: Invalid user min from 106.12.87.178 port 37336 Apr 9 13:04:11 vtv3 sshd\[17977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.87.178 Apr 9 13:04:13 vtv3 sshd\[17977\]: Failed password for invalid user min from 106.12.87.178 port 37336 ssh2 Apr 9 13:13:07 vtv3 sshd\[21595\]: Invalid user teamspeak from 106.12.87.178 port 44634 Apr 9 13:13:07 vtv  | 
                    2019-06-26 20:08:39 | 
| 77.123.67.5 | attackbotsspam | Jun 26 05:42:59 mail kernel: [326902.674502] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=77.123.67.5 DST=77.73.69.240 LEN=40 TOS=0x10 PREC=0x00 TTL=247 ID=27847 PROTO=TCP SPT=47517 DPT=3129 WINDOW=1024 RES=0x00 SYN URGP=0 ...  | 
                    2019-06-26 20:00:44 | 
| 50.236.62.110 | attackbots | Attempted login to invalid user  | 
                    2019-06-26 19:59:16 | 
| 122.155.202.198 | attackspambots | Scanning and Vuln Attempts  | 
                    2019-06-26 19:46:09 | 
| 14.247.254.241 | attackspambots | 445/tcp [2019-06-26]1pkt  | 
                    2019-06-26 19:53:29 | 
| 195.204.80.210 | attackspam | Jun 26 06:05:46 plusreed sshd[24626]: Invalid user reng from 195.204.80.210 ...  | 
                    2019-06-26 19:40:35 | 
| 94.190.4.107 | attackspambots | 23/tcp [2019-06-26]1pkt  | 
                    2019-06-26 20:15:11 | 
| 122.227.75.90 | attack | Unauthorized connection attempt from IP address 122.227.75.90 on Port 445(SMB)  | 
                    2019-06-26 19:51:08 | 
| 202.75.97.17 | attackbotsspam | Jun 26 05:43:28 ghostname-secure sshd[24992]: reveeclipse mapping checking getaddrinfo for bbr01-ge011-jkt01.choice.net.id [202.75.97.17] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 26 05:43:30 ghostname-secure sshd[24992]: Failed password for invalid user hadoop from 202.75.97.17 port 39394 ssh2 Jun 26 05:43:30 ghostname-secure sshd[24992]: Received disconnect from 202.75.97.17: 11: Bye Bye [preauth] Jun 26 05:45:40 ghostname-secure sshd[25022]: reveeclipse mapping checking getaddrinfo for bbr01-ge011-jkt01.choice.net.id [202.75.97.17] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 26 05:45:42 ghostname-secure sshd[25022]: Failed password for invalid user francesco from 202.75.97.17 port 47920 ssh2 Jun 26 05:45:42 ghostname-secure sshd[25022]: Received disconnect from 202.75.97.17: 11: Bye Bye [preauth] Jun 26 05:47:40 ghostname-secure sshd[25030]: reveeclipse mapping checking getaddrinfo for bbr01-ge011-jkt01.choice.net.id [202.75.97.17] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 2........ -------------------------------  | 
                    2019-06-26 19:44:28 |