City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.243.234.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;53.243.234.45.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:21:37 CST 2025
;; MSG SIZE  rcvd: 106Host 45.234.243.53.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 45.234.243.53.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 220.136.8.134 | attackbotsspam | UTC: 2019-10-21 port: 23/tcp | 2019-10-22 13:20:26 | 
| 123.152.51.143 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/123.152.51.143/ CN - 1H : (437) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4837 IP : 123.152.51.143 CIDR : 123.152.0.0/13 PREFIX COUNT : 1262 UNIQUE IP COUNT : 56665856 ATTACKS DETECTED ASN4837 : 1H - 7 3H - 18 6H - 35 12H - 68 24H - 151 DateTime : 2019-10-22 05:56:11 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery | 2019-10-22 13:51:26 | 
| 182.61.48.209 | attack | invalid user | 2019-10-22 13:48:53 | 
| 202.105.196.205 | attack | Attempts against Email Servers | 2019-10-22 13:50:07 | 
| 191.178.166.39 | attack | UTC: 2019-10-21 port: 23/tcp | 2019-10-22 13:29:41 | 
| 222.186.173.201 | attack | Oct 22 07:45:14 srv206 sshd[15408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201 user=root Oct 22 07:45:16 srv206 sshd[15408]: Failed password for root from 222.186.173.201 port 32630 ssh2 ... | 2019-10-22 13:49:45 | 
| 223.229.136.244 | attackspambots | Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb. | 2019-10-22 13:46:51 | 
| 46.215.10.82 | attackspambots | Brute force attempt | 2019-10-22 13:48:00 | 
| 182.61.43.47 | attackspambots | 2019-10-22T04:59:49.037636abusebot-8.cloudsearch.cf sshd\[20509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.47 user=root | 2019-10-22 13:21:06 | 
| 36.77.218.120 | attackspambots | UTC: 2019-10-21 port: 22/tcp | 2019-10-22 13:28:50 | 
| 41.213.216.242 | attack | Oct 22 02:06:22 firewall sshd[857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.213.216.242 Oct 22 02:06:22 firewall sshd[857]: Invalid user user1 from 41.213.216.242 Oct 22 02:06:25 firewall sshd[857]: Failed password for invalid user user1 from 41.213.216.242 port 46538 ssh2 ... | 2019-10-22 13:43:54 | 
| 71.6.199.23 | attackspam | UTC: 2019-10-21 port: 389/udp | 2019-10-22 13:26:02 | 
| 178.210.174.50 | attackbotsspam | Automatic report - XMLRPC Attack | 2019-10-22 13:23:07 | 
| 182.243.52.176 | attackbots | UTC: 2019-10-21 port: 23/tcp | 2019-10-22 13:23:50 | 
| 111.231.54.248 | attackspambots | Oct 22 06:48:05 site2 sshd\[38808\]: Invalid user uwsgi from 111.231.54.248Oct 22 06:48:07 site2 sshd\[38808\]: Failed password for invalid user uwsgi from 111.231.54.248 port 36756 ssh2Oct 22 06:52:38 site2 sshd\[38889\]: Failed password for root from 111.231.54.248 port 55425 ssh2Oct 22 06:56:48 site2 sshd\[38986\]: Invalid user ark from 111.231.54.248Oct 22 06:56:49 site2 sshd\[38986\]: Failed password for invalid user ark from 111.231.54.248 port 45934 ssh2 ... | 2019-10-22 13:25:17 |