City: unknown
Region: unknown
Country: Finland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 37.219.93.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 693
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;37.219.93.20.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 21:50:40 CST 2025
;; MSG SIZE  rcvd: 105
        20.93.219.37.in-addr.arpa domain name pointer 37-219-93-20.nat.bb.dnainternet.fi.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
20.93.219.37.in-addr.arpa	name = 37-219-93-20.nat.bb.dnainternet.fi.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 142.217.214.8 | attack | Unauthorized connection attempt detected from IP address 142.217.214.8 to port 1433 [J]  | 
                    2020-02-06 02:11:56 | 
| 141.212.123.203 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack -  | 
                    2020-02-06 02:19:37 | 
| 121.241.244.92 | attackbots | 2020-02-05T18:09:19.4953981240 sshd\[9244\]: Invalid user sankey from 121.241.244.92 port 44935 2020-02-05T18:09:19.4982561240 sshd\[9244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92 2020-02-05T18:09:21.4396511240 sshd\[9244\]: Failed password for invalid user sankey from 121.241.244.92 port 44935 ssh2 ...  | 
                    2020-02-06 01:58:01 | 
| 118.181.174.157 | attackspam | Unauthorized connection attempt from IP address 118.181.174.157 on Port 445(SMB)  | 
                    2020-02-06 01:40:34 | 
| 41.230.57.129 | attackbotsspam | Unauthorized connection attempt from IP address 41.230.57.129 on Port 445(SMB)  | 
                    2020-02-06 02:16:35 | 
| 142.93.160.19 | attack | Honeypot attack, port: 81, PTR: min-extra-scan-201-de-prod.binaryedge.ninja.  | 
                    2020-02-06 02:03:13 | 
| 104.248.34.192 | attackspambots | Unauthorized connection attempt detected from IP address 104.248.34.192 to port 2220 [J]  | 
                    2020-02-06 02:07:07 | 
| 129.213.36.226 | attackspambots | Feb 5 18:53:08 dedicated sshd[13123]: Invalid user talbot from 129.213.36.226 port 55354  | 
                    2020-02-06 02:00:22 | 
| 80.82.65.122 | attack | Feb 5 18:22:34 h2177944 kernel: \[4121445.264322\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.65.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=16597 PROTO=TCP SPT=52718 DPT=18503 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 5 18:22:34 h2177944 kernel: \[4121445.264337\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.65.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=16597 PROTO=TCP SPT=52718 DPT=18503 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 5 18:44:12 h2177944 kernel: \[4122742.945337\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.65.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=62219 PROTO=TCP SPT=52718 DPT=18441 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 5 18:44:12 h2177944 kernel: \[4122742.945353\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.65.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=62219 PROTO=TCP SPT=52718 DPT=18441 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 5 18:45:43 h2177944 kernel: \[4122834.563569\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.65.122 DST=85.214.117.9  | 
                    2020-02-06 02:02:02 | 
| 142.93.147.165 | attack | Honeypot attack, port: 81, PTR: min-extra-scan-116-ca-prod.binaryedge.ninja.  | 
                    2020-02-06 02:09:29 | 
| 142.93.151.22 | attackbots | Honeypot attack, port: 81, PTR: min-extra-scan-117-ca-prod.binaryedge.ninja.  | 
                    2020-02-06 02:06:24 | 
| 41.111.176.66 | attackspambots | Probing for vulnerable services  | 
                    2020-02-06 01:52:02 | 
| 123.231.109.73 | attackbotsspam | Fail2Ban - HTTP Auth Bruteforce Attempt  | 
                    2020-02-06 01:49:39 | 
| 167.172.159.4 | attack | Feb 5 14:46:10 debian-2gb-nbg1-2 kernel: \[3169617.694101\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=167.172.159.4 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=43958 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0  | 
                    2020-02-06 01:47:49 | 
| 144.217.205.214 | attackspam | MultiHost/MultiPort Probe, Scan, Hack -  | 
                    2020-02-06 01:48:09 |