City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.128.131.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;40.128.131.213.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:21:16 CST 2025
;; MSG SIZE  rcvd: 107
        213.131.128.40.in-addr.arpa domain name pointer h213.131.128.40.static.ip.windstream.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
213.131.128.40.in-addr.arpa	name = h213.131.128.40.static.ip.windstream.net.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 217.170.205.14 | attack | srv02 SSH BruteForce Attacks 22 ..  | 
                    2020-09-05 13:14:33 | 
| 200.46.205.136 | attackbots | 200.46.205.136 - - [04/Sep/2020:17:53:20 +0100] "POST /wp-login.php HTTP/1.1" 200 2345 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 200.46.205.136 - - [04/Sep/2020:17:53:22 +0100] "POST /wp-login.php HTTP/1.1" 200 2350 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 200.46.205.136 - - [04/Sep/2020:17:53:23 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ...  | 
                    2020-09-05 12:23:45 | 
| 87.98.241.242 | attackspambots | SSH login attempts with user root.  | 
                    2020-09-05 13:15:28 | 
| 94.253.93.14 | attackspam | Honeypot attack, port: 445, PTR: host-94-253-93-14.itkm.ru.  | 
                    2020-09-05 12:53:37 | 
| 132.232.53.85 | attack | $f2bV_matches  | 
                    2020-09-05 12:48:42 | 
| 122.51.119.18 | attackbotsspam | firewall-block, port(s): 11146/tcp  | 
                    2020-09-05 12:33:37 | 
| 115.211.231.39 | attackbotsspam | Honeypot attack, port: 5555, PTR: PTR record not found  | 
                    2020-09-05 12:48:57 | 
| 122.141.13.219 | attack | Port probing on unauthorized port 23  | 
                    2020-09-05 12:35:04 | 
| 72.221.232.144 | attackbots | Dovecot Invalid User Login Attempt.  | 
                    2020-09-05 13:12:59 | 
| 159.65.226.212 | attackspambots | Lines containing failures of 159.65.226.212 (max 1000) Sep 4 09:38:46 backup sshd[22549]: Did not receive identification string from 159.65.226.212 port 44980 Sep 4 09:39:03 backup sshd[22592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.226.212 user=r.r Sep 4 09:39:05 backup sshd[22592]: Failed password for r.r from 159.65.226.212 port 48994 ssh2 Sep 4 09:39:05 backup sshd[22592]: Received disconnect from 159.65.226.212 port 48994:11: Normal Shutdown, Thank you for playing [preauth] Sep 4 09:39:05 backup sshd[22592]: Disconnected from 159.65.226.212 port 48994 [preauth] Sep 4 09:39:22 backup sshd[22607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.226.212 user=r.r Sep 4 09:39:25 backup sshd[22607]: Failed password for r.r from 159.65.226.212 port 58178 ssh2 Sep 4 09:39:25 backup sshd[22607]: Received disconnect from 159.65.226.212 port 58178:11: Normal Shutdow........ ------------------------------  | 
                    2020-09-05 12:44:41 | 
| 43.248.106.103 | attack | Sep 4 18:36:56 auw2 sshd\[27202\]: Invalid user admin from 43.248.106.103 Sep 4 18:36:56 auw2 sshd\[27202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.106.103 Sep 4 18:36:58 auw2 sshd\[27202\]: Failed password for invalid user admin from 43.248.106.103 port 56316 ssh2 Sep 4 18:41:58 auw2 sshd\[27752\]: Invalid user postgres from 43.248.106.103 Sep 4 18:41:58 auw2 sshd\[27752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.106.103  | 
                    2020-09-05 12:55:13 | 
| 222.186.175.150 | attackspambots | Sep 5 04:57:00 hcbbdb sshd\[3703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Sep 5 04:57:01 hcbbdb sshd\[3703\]: Failed password for root from 222.186.175.150 port 47420 ssh2 Sep 5 04:57:04 hcbbdb sshd\[3703\]: Failed password for root from 222.186.175.150 port 47420 ssh2 Sep 5 04:57:08 hcbbdb sshd\[3703\]: Failed password for root from 222.186.175.150 port 47420 ssh2 Sep 5 04:57:11 hcbbdb sshd\[3703\]: Failed password for root from 222.186.175.150 port 47420 ssh2  | 
                    2020-09-05 12:59:09 | 
| 106.203.144.36 | attack | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-09-05 13:02:18 | 
| 106.54.52.35 | attackspambots | Invalid user hostmaster from 106.54.52.35 port 45460  | 
                    2020-09-05 13:12:14 | 
| 159.65.216.161 | attackbots | (sshd) Failed SSH login from 159.65.216.161 (US/United States/-): 12 in the last 3600 secs  | 
                    2020-09-05 13:04:43 |