City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.13.108.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;38.13.108.252.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 04:57:46 CST 2025
;; MSG SIZE  rcvd: 106
        252.108.13.38.in-addr.arpa domain name pointer 38-13.108-252.az.fibertdns.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
252.108.13.38.in-addr.arpa	name = 38-13.108-252.az.fibertdns.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 119.28.177.36 | attackspam | Invalid user testing from 119.28.177.36 port 55714  | 
                    2020-04-24 13:53:32 | 
| 36.111.146.209 | attackbots | Invalid user ubuntu from 36.111.146.209 port 35414  | 
                    2020-04-24 14:01:45 | 
| 201.149.20.162 | attack | Apr 24 08:01:29 ns381471 sshd[6470]: Failed password for root from 201.149.20.162 port 40760 ssh2  | 
                    2020-04-24 14:12:05 | 
| 175.5.41.177 | attackbotsspam | prod6 ...  | 
                    2020-04-24 13:53:07 | 
| 54.37.232.108 | attack | Apr 24 07:21:13 prox sshd[28231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.232.108 Apr 24 07:21:15 prox sshd[28231]: Failed password for invalid user un from 54.37.232.108 port 46508 ssh2  | 
                    2020-04-24 13:43:07 | 
| 64.202.187.152 | attack | 5x Failed Password  | 
                    2020-04-24 13:28:22 | 
| 41.44.182.85 | attack | $f2bV_matches  | 
                    2020-04-24 13:56:38 | 
| 177.84.77.115 | attack | Apr 24 07:41:42 vpn01 sshd[19617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.84.77.115 Apr 24 07:41:44 vpn01 sshd[19617]: Failed password for invalid user io from 177.84.77.115 port 47202 ssh2 ...  | 
                    2020-04-24 14:13:55 | 
| 144.217.34.148 | attackbotsspam | srv02 Mass scanning activity detected Target: 5093 ..  | 
                    2020-04-24 14:21:04 | 
| 157.245.12.36 | attackbotsspam | Invalid user ng from 157.245.12.36 port 57622  | 
                    2020-04-24 14:20:26 | 
| 222.186.180.8 | attackspam | Apr 23 19:42:56 hanapaa sshd\[14462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root Apr 23 19:42:58 hanapaa sshd\[14462\]: Failed password for root from 222.186.180.8 port 48158 ssh2 Apr 23 19:43:14 hanapaa sshd\[14489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root Apr 23 19:43:16 hanapaa sshd\[14489\]: Failed password for root from 222.186.180.8 port 53526 ssh2 Apr 23 19:43:19 hanapaa sshd\[14489\]: Failed password for root from 222.186.180.8 port 53526 ssh2  | 
                    2020-04-24 13:54:59 | 
| 103.84.63.5 | attackspam | fail2ban  | 
                    2020-04-24 14:01:09 | 
| 99.183.144.132 | attackspam | Invalid user zookeeper from 99.183.144.132 port 39364  | 
                    2020-04-24 14:10:02 | 
| 117.50.49.57 | attackspambots | Apr 24 05:51:07 v22018086721571380 sshd[32754]: Failed password for invalid user postgres from 117.50.49.57 port 35834 ssh2  | 
                    2020-04-24 13:50:44 | 
| 114.67.79.46 | attackspam | Apr 24 05:53:41 ns392434 sshd[13176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.79.46 user=root Apr 24 05:53:43 ns392434 sshd[13176]: Failed password for root from 114.67.79.46 port 38578 ssh2 Apr 24 06:02:49 ns392434 sshd[13566]: Invalid user hadoop from 114.67.79.46 port 33751 Apr 24 06:02:49 ns392434 sshd[13566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.79.46 Apr 24 06:02:49 ns392434 sshd[13566]: Invalid user hadoop from 114.67.79.46 port 33751 Apr 24 06:02:50 ns392434 sshd[13566]: Failed password for invalid user hadoop from 114.67.79.46 port 33751 ssh2 Apr 24 06:07:36 ns392434 sshd[13857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.79.46 user=root Apr 24 06:07:38 ns392434 sshd[13857]: Failed password for root from 114.67.79.46 port 36360 ssh2 Apr 24 06:12:11 ns392434 sshd[14625]: Invalid user ftpuser from 114.67.79.46 port 38966  | 
                    2020-04-24 13:51:06 |