City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.221.139.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;43.221.139.172.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 07:18:31 CST 2025
;; MSG SIZE  rcvd: 107Host 172.139.221.43.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 172.139.221.43.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 31.208.74.177 | attack | Unauthorized connection attempt detected from IP address 31.208.74.177 to port 22 [J] | 2020-01-18 02:50:04 | 
| 51.89.151.214 | attack | Unauthorized connection attempt detected from IP address 51.89.151.214 to port 2220 [J] | 2020-01-18 03:09:19 | 
| 104.131.8.137 | attackspambots | Unauthorized connection attempt detected from IP address 104.131.8.137 to port 2220 [J] | 2020-01-18 03:07:10 | 
| 206.189.124.254 | attackspambots | Unauthorized connection attempt detected from IP address 206.189.124.254 to port 2220 [J] | 2020-01-18 03:14:03 | 
| 212.48.70.22 | attackspambots | Jan 18 00:43:32 webhost01 sshd[23086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.48.70.22 Jan 18 00:43:34 webhost01 sshd[23086]: Failed password for invalid user hank from 212.48.70.22 port 33110 ssh2 ... | 2020-01-18 02:52:32 | 
| 51.75.28.134 | attackspam | Unauthorized connection attempt detected from IP address 51.75.28.134 to port 2220 [J] | 2020-01-18 02:46:39 | 
| 117.139.166.203 | attack | Unauthorized connection attempt detected from IP address 117.139.166.203 to port 2220 [J] | 2020-01-18 03:03:31 | 
| 178.128.213.126 | attackspambots | Unauthorized connection attempt detected from IP address 178.128.213.126 to port 2220 [J] | 2020-01-18 02:58:11 | 
| 148.63.53.51 | attackbotsspam | Unauthorized connection attempt detected from IP address 148.63.53.51 to port 2220 [J] | 2020-01-18 03:19:19 | 
| 187.189.109.138 | attackspam | Invalid user server from 187.189.109.138 port 60308 | 2020-01-18 02:55:05 | 
| 144.217.89.55 | attackspambots | Unauthorized connection attempt detected from IP address 144.217.89.55 to port 2220 [J] | 2020-01-18 02:59:23 | 
| 68.183.84.44 | attack | Jan 17 18:02:48 mx01 sshd[22899]: Invalid user br from 68.183.84.44 Jan 17 18:02:48 mx01 sshd[22899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.84.44 Jan 17 18:02:50 mx01 sshd[22899]: Failed password for invalid user br from 68.183.84.44 port 42304 ssh2 Jan 17 18:02:50 mx01 sshd[22899]: Received disconnect from 68.183.84.44: 11: Bye Bye [preauth] Jan 17 18:18:53 mx01 sshd[25072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.84.44 user=r.r Jan 17 18:18:55 mx01 sshd[25072]: Failed password for r.r from 68.183.84.44 port 49388 ssh2 Jan 17 18:18:55 mx01 sshd[25072]: Received disconnect from 68.183.84.44: 11: Bye Bye [preauth] Jan 17 18:23:01 mx01 sshd[25591]: Invalid user deploy from 68.183.84.44 Jan 17 18:23:01 mx01 sshd[25591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.84.44 Jan 17 18:23:03 mx01 sshd[25591]: Failed ........ ------------------------------- | 2020-01-18 02:44:23 | 
| 46.105.29.160 | attackbots | 2020-01-17 02:53:26 server sshd[10061]: Failed password for invalid user zq from 46.105.29.160 port 55270 ssh2 | 2020-01-18 02:48:09 | 
| 146.199.171.103 | attack | Invalid user benny from 146.199.171.103 port 51846 | 2020-01-18 03:19:45 | 
| 190.192.217.117 | attackbots | Invalid user amx from 190.192.217.117 port 45800 | 2020-01-18 02:54:25 |