City: unknown
Region: unknown
Country: Ireland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.242.98.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.242.98.120.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 11:29:01 CST 2025
;; MSG SIZE  rcvd: 106
        120.98.242.34.in-addr.arpa domain name pointer ec2-34-242-98-120.eu-west-1.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
120.98.242.34.in-addr.arpa	name = ec2-34-242-98-120.eu-west-1.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 36.89.225.63 | attackspam | Unauthorized connection attempt detected from IP address 36.89.225.63 to port 445  | 
                    2019-12-25 02:43:12 | 
| 14.98.227.98 | attack | Unauthorized connection attempt detected from IP address 14.98.227.98 to port 445  | 
                    2019-12-25 02:47:58 | 
| 187.94.222.172 | attackbotsspam | Unauthorized connection attempt detected from IP address 187.94.222.172 to port 445  | 
                    2019-12-25 02:30:44 | 
| 35.231.215.178 | attackbots | Unauthorized connection attempt detected from IP address 35.231.215.178 to port 5902  | 
                    2019-12-25 02:58:04 | 
| 132.248.204.99 | attackspam | SSH Brute-Force reported by Fail2Ban  | 
                    2019-12-25 02:45:41 | 
| 153.126.151.55 | attackbots | Dec 24 18:57:32 [host] sshd[5776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.126.151.55 user=root Dec 24 18:57:34 [host] sshd[5776]: Failed password for root from 153.126.151.55 port 57228 ssh2 Dec 24 18:59:24 [host] sshd[5783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.126.151.55 user=root  | 
                    2019-12-25 02:26:52 | 
| 165.227.225.195 | attackspambots | Invalid user arobert from 165.227.225.195 port 52896  | 
                    2019-12-25 02:50:01 | 
| 159.203.201.233 | attackspambots | Portscan or hack attempt detected by psad/fwsnort  | 
                    2019-12-25 02:34:40 | 
| 112.85.42.173 | attack | 2019-12-24T19:01:33.816518abusebot-3.cloudsearch.cf sshd[22587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173 user=root 2019-12-24T19:01:35.966374abusebot-3.cloudsearch.cf sshd[22587]: Failed password for root from 112.85.42.173 port 6056 ssh2 2019-12-24T19:01:39.059245abusebot-3.cloudsearch.cf sshd[22587]: Failed password for root from 112.85.42.173 port 6056 ssh2 2019-12-24T19:01:33.816518abusebot-3.cloudsearch.cf sshd[22587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173 user=root 2019-12-24T19:01:35.966374abusebot-3.cloudsearch.cf sshd[22587]: Failed password for root from 112.85.42.173 port 6056 ssh2 2019-12-24T19:01:39.059245abusebot-3.cloudsearch.cf sshd[22587]: Failed password for root from 112.85.42.173 port 6056 ssh2 2019-12-24T19:01:33.816518abusebot-3.cloudsearch.cf sshd[22587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= r ...  | 
                    2019-12-25 03:02:03 | 
| 51.68.198.75 | attackspambots | Dec 24 19:27:09 [host] sshd[7466]: Invalid user contact![at]23m from 51.68.198.75 Dec 24 19:27:09 [host] sshd[7466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.75 Dec 24 19:27:11 [host] sshd[7466]: Failed password for invalid user contact![at]23m from 51.68.198.75 port 37050 ssh2  | 
                    2019-12-25 02:43:45 | 
| 40.77.167.50 | attackbots | Automatic report - Banned IP Access  | 
                    2019-12-25 02:55:01 | 
| 69.94.136.246 | attack | Dec 24 16:33:03 grey postfix/smtpd\[3068\]: NOQUEUE: reject: RCPT from approve.kwyali.com\[69.94.136.246\]: 554 5.7.1 Service unavailable\; Client host \[69.94.136.246\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.136.246\]\; from=\  | 
                    2019-12-25 02:35:05 | 
| 91.134.240.73 | attackspam | Dec 24 15:33:08 *** sshd[3087]: Invalid user witort from 91.134.240.73  | 
                    2019-12-25 02:32:27 | 
| 78.189.167.149 | attack | SSH login attempts brute force.  | 
                    2019-12-25 02:31:03 | 
| 106.12.118.235 | attackspambots | Invalid user goines from 106.12.118.235 port 56008  | 
                    2019-12-25 02:33:04 |