City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 25.99.40.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9191
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;25.99.40.214.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:24:09 CST 2025
;; MSG SIZE  rcvd: 105
        Host 214.40.99.25.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 214.40.99.25.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 123.21.177.222 | attack | Lines containing failures of 123.21.177.222 Aug 28 01:35:33 home sshd[15053]: Invalid user admin from 123.21.177.222 port 36113 Aug 28 01:35:33 home sshd[15053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.177.222 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=123.21.177.222  | 
                    2019-08-30 02:41:34 | 
| 81.22.45.81 | attack | 08/29/2019-08:13:14.420998 81.22.45.81 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 85  | 
                    2019-08-30 02:53:47 | 
| 200.98.205.86 | attackbotsspam | firewall-block, port(s): 445/tcp  | 
                    2019-08-30 03:23:57 | 
| 68.183.115.83 | attackbots | Aug 29 20:37:04 ArkNodeAT sshd\[16544\]: Invalid user xd from 68.183.115.83 Aug 29 20:37:04 ArkNodeAT sshd\[16544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.115.83 Aug 29 20:37:05 ArkNodeAT sshd\[16544\]: Failed password for invalid user xd from 68.183.115.83 port 33870 ssh2  | 
                    2019-08-30 03:26:13 | 
| 54.38.33.186 | attack | Invalid user test from 54.38.33.186 port 50410  | 
                    2019-08-30 02:59:20 | 
| 138.36.0.250 | attack | [ES hit] Tried to deliver spam.  | 
                    2019-08-30 03:20:05 | 
| 109.228.60.219 | attack | "GET /wso.php HTTP/1.1" 404 "GET /modules/modules/modules.php HTTP/1.1" 404 "GET /modules/mod_simplefileuploadv1.3/elements/Clean.php HTTP/1.1" 404 "GET /modules/mod_simplefileuploadv1.3/elements/udd.php HTTP/1.1" 404 "GET /libraries/joomla/css.php HTTP/1.1" 404 "GET /libraries/joomla/jmails.php?u HTTP/1.1" 404 "GET /libraries/joomla/jmail.php?u HTTP/1.1" 404  | 
                    2019-08-30 02:50:57 | 
| 182.61.53.171 | attackspam | $f2bV_matches  | 
                    2019-08-30 03:20:20 | 
| 182.16.163.10 | attackbots | Brute force attempt  | 
                    2019-08-30 02:40:32 | 
| 182.162.70.253 | attackbots | 2019-08-29T19:04:17.155293abusebot-5.cloudsearch.cf sshd\[20154\]: Invalid user belka from 182.162.70.253 port 59754  | 
                    2019-08-30 03:27:53 | 
| 107.170.225.119 | attack | 119/tcp 49755/tcp 30613/tcp... [2019-06-28/08-29]63pkt,51pt.(tcp),3pt.(udp)  | 
                    2019-08-30 03:30:43 | 
| 163.172.224.238 | attackbots | Malware  | 
                    2019-08-30 03:14:48 | 
| 47.247.182.108 | attackbotsspam | 19/8/29@05:21:15: FAIL: Alarm-Intrusion address from=47.247.182.108 ...  | 
                    2019-08-30 03:03:05 | 
| 103.110.89.148 | attack | Aug 29 20:30:55 ns41 sshd[8879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.110.89.148  | 
                    2019-08-30 03:09:54 | 
| 182.38.203.105 | attackspam | MultiHost/MultiPort Probe, Scan, Hack -  | 
                    2019-08-30 02:43:05 |