City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.57.104.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.57.104.39.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 22:33:17 CST 2025
;; MSG SIZE  rcvd: 105
        Host 39.104.57.44.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 39.104.57.44.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 190.210.9.25 | attack | Automatic report - Banned IP Access  | 
                    2019-08-08 05:21:04 | 
| 210.6.124.162 | attack | Aug 7 17:39:33 TCP Attack: SRC=210.6.124.162 DST=[Masked] LEN=277 TOS=0x00 PREC=0x00 TTL=53 DF PROTO=TCP SPT=36196 DPT=80 WINDOW=229 RES=0x00 ACK PSH URGP=0  | 
                    2019-08-08 05:21:49 | 
| 185.223.161.80 | attack | Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="  | 
                    2019-08-08 05:11:27 | 
| 217.34.52.153 | attack | Aug 7 17:40:09 *** sshd[27018]: Invalid user ftpadmin from 217.34.52.153  | 
                    2019-08-08 05:03:30 | 
| 131.100.77.18 | attackbotsspam | Brute force attack to crack SMTP password (port 25 / 587)  | 
                    2019-08-08 05:12:28 | 
| 149.202.52.221 | attack | Aug 7 20:06:03 vps647732 sshd[7675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.52.221 Aug 7 20:06:04 vps647732 sshd[7675]: Failed password for invalid user webstar from 149.202.52.221 port 57634 ssh2 ...  | 
                    2019-08-08 05:17:31 | 
| 125.209.124.155 | attack | leo_www  | 
                    2019-08-08 05:14:23 | 
| 43.227.68.26 | attackspambots | Automatic report - Banned IP Access  | 
                    2019-08-08 05:31:41 | 
| 185.100.87.129 | attack | Aug 7 20:14:26 *** sshd[31754]: Failed password for invalid user cisco from 185.100.87.129 port 33731 ssh2  | 
                    2019-08-08 05:25:11 | 
| 179.33.137.117 | attack | Aug 7 20:49:19 MK-Soft-VM3 sshd\[27398\]: Invalid user comercial from 179.33.137.117 port 45186 Aug 7 20:49:19 MK-Soft-VM3 sshd\[27398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117 Aug 7 20:49:21 MK-Soft-VM3 sshd\[27398\]: Failed password for invalid user comercial from 179.33.137.117 port 45186 ssh2 ...  | 
                    2019-08-08 05:02:09 | 
| 106.51.33.29 | attack | Aug 7 21:50:54 microserver sshd[22230]: Invalid user teamspeak2 from 106.51.33.29 port 44630 Aug 7 21:50:54 microserver sshd[22230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.33.29 Aug 7 21:50:56 microserver sshd[22230]: Failed password for invalid user teamspeak2 from 106.51.33.29 port 44630 ssh2 Aug 7 21:56:00 microserver sshd[23248]: Invalid user sunshine from 106.51.33.29 port 38672 Aug 7 21:56:00 microserver sshd[23248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.33.29 Aug 7 22:06:19 microserver sshd[24970]: Invalid user haribo from 106.51.33.29 port 55008 Aug 7 22:06:19 microserver sshd[24970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.33.29 Aug 7 22:06:22 microserver sshd[24970]: Failed password for invalid user haribo from 106.51.33.29 port 55008 ssh2 Aug 7 22:11:22 microserver sshd[25907]: Invalid user qwe123 from 106.51.33.29 port 4904  | 
                    2019-08-08 04:46:15 | 
| 191.53.193.70 | attackspam | Aug 7 19:37:30 xeon postfix/smtpd[15324]: warning: unknown[191.53.193.70]: SASL PLAIN authentication failed: authentication failure  | 
                    2019-08-08 05:11:11 | 
| 42.243.140.90 | attack | Aug 7 17:39:39 DDOS Attack: SRC=42.243.140.90 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=51 DF PROTO=TCP SPT=45281 DPT=80 WINDOW=0 RES=0x00 RST URGP=0  | 
                    2019-08-08 05:20:19 | 
| 170.130.187.30 | attack | Automatic report - Port Scan Attack  | 
                    2019-08-08 04:46:50 | 
| 37.49.227.12 | attackbots | " "  | 
                    2019-08-08 04:50:45 |