City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.193.96.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.193.96.128.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 02:06:31 CST 2025
;; MSG SIZE  rcvd: 106Host 128.96.193.50.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 128.96.193.50.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 80.211.0.239 | attackbots | Jul 17 00:09:05 raspberrypi sshd[23747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.0.239 user=www-data Jul 17 00:09:07 raspberrypi sshd[23747]: Failed password for invalid user www-data from 80.211.0.239 port 34406 ssh2 ... | 2020-07-17 06:24:26 | 
| 77.45.86.207 | attackspambots | SASL PLAIN auth failed: ruser=... | 2020-07-17 06:39:25 | 
| 139.59.59.102 | attackspam | Portscan or hack attempt detected by psad/fwsnort | 2020-07-17 06:27:10 | 
| 212.129.57.201 | attackbotsspam | 921. On Jul 16 2020 experienced a Brute Force SSH login attempt -> 2 unique times by 212.129.57.201. | 2020-07-17 06:12:19 | 
| 54.39.98.253 | attack | Invalid user fauzi from 54.39.98.253 port 43380 | 2020-07-17 06:05:45 | 
| 156.67.219.70 | attack | Jul 16 05:58:00 gutwein sshd[18658]: Failed password for invalid user iptv from 156.67.219.70 port 46290 ssh2 Jul 16 05:58:00 gutwein sshd[18658]: Received disconnect from 156.67.219.70: 11: Bye Bye [preauth] Jul 16 06:05:38 gutwein sshd[20135]: Failed password for invalid user steam from 156.67.219.70 port 58232 ssh2 Jul 16 06:05:49 gutwein sshd[20135]: Received disconnect from 156.67.219.70: 11: Bye Bye [preauth] Jul 16 06:08:40 gutwein sshd[20685]: Failed password for invalid user admin from 156.67.219.70 port 54510 ssh2 Jul 16 06:08:41 gutwein sshd[20685]: Received disconnect from 156.67.219.70: 11: Bye Bye [preauth] Jul 16 06:11:39 gutwein sshd[21261]: Failed password for invalid user shadow from 156.67.219.70 port 49818 ssh2 Jul 16 06:11:41 gutwein sshd[21261]: Received disconnect from 156.67.219.70: 11: Bye Bye [preauth] Jul 16 06:14:49 gutwein sshd[21796]: Failed password for invalid user user from 156.67.219.70 port 44950 ssh2 Jul 16 06:14:49 gutwein sshd[21796........ ------------------------------- | 2020-07-17 06:21:12 | 
| 45.228.50.195 | attack | Unauthorized SSH connection attempt | 2020-07-17 06:31:29 | 
| 77.45.86.105 | attackspambots | SASL PLAIN auth failed: ruser=... | 2020-07-17 06:39:56 | 
| 134.209.154.78 | attackspambots | Bruteforce detected by fail2ban | 2020-07-17 06:12:51 | 
| 219.248.82.98 | attackspam | (sshd) Failed SSH login from 219.248.82.98 (KR/South Korea/-): 5 in the last 3600 secs | 2020-07-17 06:21:41 | 
| 108.14.14.194 | attack | Port Scan detected! ... | 2020-07-17 06:04:55 | 
| 185.165.169.168 | attackspam | Jul 17 00:15:54 fhem-rasp sshd[24786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.165.169.168 Jul 17 00:15:55 fhem-rasp sshd[24786]: Failed password for invalid user fd from 185.165.169.168 port 33882 ssh2 ... | 2020-07-17 06:33:29 | 
| 190.55.53.49 | attack | SSH Invalid Login | 2020-07-17 06:04:37 | 
| 92.63.197.99 | attackbots | 07/16/2020-09:42:17.591964 92.63.197.99 Protocol: 6 ET SCAN NMAP -sS window 1024 | 2020-07-17 06:11:29 | 
| 191.233.255.128 | attackbots | SSH Invalid Login | 2020-07-17 06:07:48 |