City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.0.45.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;38.0.45.74.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:11:22 CST 2025
;; MSG SIZE  rcvd: 103
        Host 74.45.0.38.in-addr.arpa not found: 2(SERVFAIL)
        ;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53
** server can't find 74.45.0.38.in-addr.arpa: SERVFAIL
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 113.25.116.191 | attackbotsspam | trying to access non-authorized port  | 
                    2020-04-03 22:01:45 | 
| 213.163.104.63 | attackbotsspam | Unauthorized connection attempt from IP address 213.163.104.63 on Port 445(SMB)  | 
                    2020-04-03 22:09:58 | 
| 2.186.13.123 | attack | 1585918807 - 04/03/2020 20:00:07 Host: 2.186.13.123/2.186.13.123 Port: 23 TCP Blocked ...  | 
                    2020-04-03 22:22:58 | 
| 23.90.57.212 | attackbots | ruleset=check_relay, arg1=[23.90.57.212], arg2=23.90.57.212, relay=cheating.reloanup.com [23.90.57.212] (may be forged), discard  | 
                    2020-04-03 21:33:22 | 
| 78.165.14.184 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 03-04-2020 14:00:11.  | 
                    2020-04-03 22:16:29 | 
| 202.131.242.75 | attack | Unauthorized connection attempt from IP address 202.131.242.75 on Port 445(SMB)  | 
                    2020-04-03 21:38:44 | 
| 190.85.171.126 | attack | Apr 3 15:53:41 srv206 sshd[27137]: Invalid user nginx from 190.85.171.126 Apr 3 15:53:41 srv206 sshd[27137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.171.126 Apr 3 15:53:41 srv206 sshd[27137]: Invalid user nginx from 190.85.171.126 Apr 3 15:53:43 srv206 sshd[27137]: Failed password for invalid user nginx from 190.85.171.126 port 42660 ssh2 ...  | 
                    2020-04-03 21:56:39 | 
| 81.200.30.151 | attackbots | Apr 3 15:12:13 MainVPS sshd[32041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.200.30.151 user=root Apr 3 15:12:15 MainVPS sshd[32041]: Failed password for root from 81.200.30.151 port 54710 ssh2 Apr 3 15:16:24 MainVPS sshd[7815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.200.30.151 user=root Apr 3 15:16:26 MainVPS sshd[7815]: Failed password for root from 81.200.30.151 port 37312 ssh2 Apr 3 15:20:32 MainVPS sshd[16054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.200.30.151 user=root Apr 3 15:20:33 MainVPS sshd[16054]: Failed password for root from 81.200.30.151 port 48148 ssh2 ...  | 
                    2020-04-03 22:03:43 | 
| 107.180.92.3 | attackbots | Apr 3 13:00:27 *** sshd[2768]: User root from 107.180.92.3 not allowed because not listed in AllowUsers  | 
                    2020-04-03 21:52:01 | 
| 159.65.11.106 | attackbotsspam | Masscan Port Scanning Tool Detection  | 
                    2020-04-03 21:39:12 | 
| 159.89.153.54 | attack | Apr 3 19:50:44 itv-usvr-02 sshd[11797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.153.54 user=root Apr 3 19:55:42 itv-usvr-02 sshd[11955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.153.54 user=root Apr 3 20:00:43 itv-usvr-02 sshd[12158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.153.54 user=root  | 
                    2020-04-03 21:28:58 | 
| 177.89.115.134 | attackspam | Automatic report - Port Scan Attack  | 
                    2020-04-03 21:29:56 | 
| 218.92.0.207 | attackspam | Apr 3 15:57:39 eventyay sshd[13714]: Failed password for root from 218.92.0.207 port 31761 ssh2 Apr 3 15:59:10 eventyay sshd[13736]: Failed password for root from 218.92.0.207 port 22853 ssh2 Apr 3 15:59:12 eventyay sshd[13736]: Failed password for root from 218.92.0.207 port 22853 ssh2 ...  | 
                    2020-04-03 22:20:46 | 
| 178.159.127.5 | attack | Unauthorized connection attempt from IP address 178.159.127.5 on Port 445(SMB)  | 
                    2020-04-03 22:00:05 | 
| 139.255.38.131 | attack | Unauthorized connection attempt from IP address 139.255.38.131 on Port 445(SMB)  | 
                    2020-04-03 21:30:56 |