City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.138.1.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.138.1.198.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:38:14 CST 2025
;; MSG SIZE  rcvd: 105
        Host 198.1.138.48.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 198.1.138.48.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 96.48.244.48 | attack | Feb 7 23:32:16 legacy sshd[24737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.48.244.48 Feb 7 23:32:18 legacy sshd[24737]: Failed password for invalid user zug from 96.48.244.48 port 49170 ssh2 Feb 7 23:35:23 legacy sshd[24950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.48.244.48 ...  | 
                    2020-02-08 10:49:15 | 
| 167.250.54.107 | attackbotsspam | Email rejected due to spam filtering  | 
                    2020-02-08 10:30:23 | 
| 202.191.200.227 | attackspambots | Feb 8 00:35:32 web8 sshd\[30183\]: Invalid user pra from 202.191.200.227 Feb 8 00:35:32 web8 sshd\[30183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.200.227 Feb 8 00:35:33 web8 sshd\[30183\]: Failed password for invalid user pra from 202.191.200.227 port 36233 ssh2 Feb 8 00:38:43 web8 sshd\[31689\]: Invalid user pun from 202.191.200.227 Feb 8 00:38:43 web8 sshd\[31689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.200.227  | 
                    2020-02-08 10:56:19 | 
| 49.231.5.51 | attack | Feb 8 02:35:48 web8 sshd\[27043\]: Invalid user rdy from 49.231.5.51 Feb 8 02:35:48 web8 sshd\[27043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.5.51 Feb 8 02:35:50 web8 sshd\[27043\]: Failed password for invalid user rdy from 49.231.5.51 port 36506 ssh2 Feb 8 02:39:12 web8 sshd\[28840\]: Invalid user uue from 49.231.5.51 Feb 8 02:39:12 web8 sshd\[28840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.5.51  | 
                    2020-02-08 10:52:14 | 
| 189.52.149.134 | attackbotsspam | 445/tcp [2020-02-07]1pkt  | 
                    2020-02-08 10:26:46 | 
| 117.195.46.169 | attack | 1581114949 - 02/07/2020 23:35:49 Host: 117.195.46.169/117.195.46.169 Port: 445 TCP Blocked  | 
                    2020-02-08 10:24:23 | 
| 182.232.248.113 | attack | 1581114934 - 02/07/2020 23:35:34 Host: 182.232.248.113/182.232.248.113 Port: 445 TCP Blocked  | 
                    2020-02-08 10:34:40 | 
| 222.186.15.10 | attackspambots | SSH auth scanning - multiple failed logins  | 
                    2020-02-08 10:45:48 | 
| 103.63.2.240 | attack | 1433/tcp [2020-02-07]1pkt  | 
                    2020-02-08 10:28:17 | 
| 85.247.160.73 | attackbots | Email rejected due to spam filtering  | 
                    2020-02-08 10:36:33 | 
| 174.26.74.51 | attack | Automatic report - Port Scan Attack  | 
                    2020-02-08 10:57:17 | 
| 45.224.105.225 | attack | (imapd) Failed IMAP login from 45.224.105.225 (AR/Argentina/-): 1 in the last 3600 secs  | 
                    2020-02-08 11:03:34 | 
| 41.102.60.191 | attack | Email rejected due to spam filtering  | 
                    2020-02-08 10:48:19 | 
| 91.204.72.77 | attackbotsspam | 91.204.72.77 - - [08/Feb/2020:01:35:24 +0300] "POST /wp-login.php HTTP/1.1" 200 2568 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2020-02-08 10:47:32 | 
| 165.227.104.253 | attack | $f2bV_matches  | 
                    2020-02-08 11:00:14 |