City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.53.242.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;4.53.242.55.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 17:56:22 CST 2025
;; MSG SIZE  rcvd: 104
        Host 55.242.53.4.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 55.242.53.4.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 52.60.147.135 | attackbots | $f2bV_matches  | 
                    2020-03-08 15:36:52 | 
| 185.17.229.97 | attackbotsspam | Mar 8 07:09:30 lnxded63 sshd[14438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.97  | 
                    2020-03-08 15:56:40 | 
| 47.137.195.38 | attackspambots | Honeypot attack, port: 81, PTR: PTR record not found  | 
                    2020-03-08 15:36:03 | 
| 85.18.30.39 | attackspam | Brute force 75 attempts  | 
                    2020-03-08 16:01:33 | 
| 103.40.73.139 | attackspam | port scan and connect, tcp 23 (telnet)  | 
                    2020-03-08 15:54:16 | 
| 110.49.73.51 | attackspambots | Mar 7 21:33:46 wbs sshd\[15865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.73.51 user=man Mar 7 21:33:48 wbs sshd\[15865\]: Failed password for man from 110.49.73.51 port 49932 ssh2 Mar 7 21:37:38 wbs sshd\[16171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.73.51 user=root Mar 7 21:37:40 wbs sshd\[16171\]: Failed password for root from 110.49.73.51 port 49838 ssh2 Mar 7 21:42:34 wbs sshd\[16553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.73.51 user=root  | 
                    2020-03-08 16:01:16 | 
| 121.188.155.179 | attack | Honeypot attack, port: 5555, PTR: PTR record not found  | 
                    2020-03-08 16:06:00 | 
| 132.232.79.135 | attackbots | Mar 8 08:38:33 v22018076622670303 sshd\[504\]: Invalid user osman from 132.232.79.135 port 44188 Mar 8 08:38:33 v22018076622670303 sshd\[504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.79.135 Mar 8 08:38:35 v22018076622670303 sshd\[504\]: Failed password for invalid user osman from 132.232.79.135 port 44188 ssh2 ...  | 
                    2020-03-08 15:51:05 | 
| 178.32.117.75 | attackbotsspam | Brute-force attempt banned  | 
                    2020-03-08 16:07:11 | 
| 200.205.30.251 | attack | Honeypot attack, port: 445, PTR: 200-205-30-251.curtumecouro.com.br.  | 
                    2020-03-08 16:04:34 | 
| 103.232.120.109 | attack | Mar 8 07:59:00 lnxded63 sshd[18094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109  | 
                    2020-03-08 15:23:16 | 
| 175.24.135.96 | attackspam | Mar 8 06:59:12 jane sshd[27579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.135.96 Mar 8 06:59:13 jane sshd[27579]: Failed password for invalid user bliu from 175.24.135.96 port 53606 ssh2 ...  | 
                    2020-03-08 15:54:58 | 
| 222.186.31.166 | attackbotsspam | 08.03.2020 07:39:44 SSH access blocked by firewall  | 
                    2020-03-08 15:43:27 | 
| 59.126.178.70 | attack | Honeypot attack, port: 81, PTR: 59-126-178-70.HINET-IP.hinet.net.  | 
                    2020-03-08 15:59:12 | 
| 35.240.189.61 | attack | Automatic report - XMLRPC Attack  | 
                    2020-03-08 15:45:41 |