City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.134.238.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25699
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.134.238.150.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 17:56:51 CST 2025
;; MSG SIZE  rcvd: 107
        Host 150.238.134.54.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 150.238.134.54.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 159.203.201.61 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 990 proto: TCP cat: Misc Attack  | 
                    2019-10-26 06:41:07 | 
| 172.111.134.20 | attack | Oct 26 00:26:58 localhost sshd\[25830\]: Invalid user hope from 172.111.134.20 port 55026 Oct 26 00:26:58 localhost sshd\[25830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.111.134.20 Oct 26 00:27:01 localhost sshd\[25830\]: Failed password for invalid user hope from 172.111.134.20 port 55026 ssh2  | 
                    2019-10-26 06:27:45 | 
| 94.25.171.170 | attackbots | ENG,WP GET /wp-login.php  | 
                    2019-10-26 06:35:25 | 
| 159.203.201.125 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 512 proto: TCP cat: Misc Attack  | 
                    2019-10-26 06:54:26 | 
| 202.120.38.28 | attackspam | Oct 25 12:09:21 wbs sshd\[11751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.38.28 user=root Oct 25 12:09:23 wbs sshd\[11751\]: Failed password for root from 202.120.38.28 port 24514 ssh2 Oct 25 12:14:01 wbs sshd\[12129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.38.28 user=root Oct 25 12:14:03 wbs sshd\[12129\]: Failed password for root from 202.120.38.28 port 33281 ssh2 Oct 25 12:18:42 wbs sshd\[12485\]: Invalid user michael from 202.120.38.28 Oct 25 12:18:42 wbs sshd\[12485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.38.28  | 
                    2019-10-26 06:28:20 | 
| 92.119.160.60 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 44844 proto: TCP cat: Misc Attack  | 
                    2019-10-26 06:58:38 | 
| 67.205.170.119 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 61 - port: 3489 proto: TCP cat: Misc Attack  | 
                    2019-10-26 06:45:15 | 
| 112.175.120.161 | attack | ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak  | 
                    2019-10-26 06:56:50 | 
| 45.136.109.83 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 30 - port: 22 proto: TCP cat: Misc Attack  | 
                    2019-10-26 06:46:45 | 
| 82.64.138.80 | attackbotsspam | Oct 26 01:10:34 www sshd\[57845\]: Invalid user ubuntu from 82.64.138.80 Oct 26 01:10:34 www sshd\[57845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.138.80 Oct 26 01:10:36 www sshd\[57845\]: Failed password for invalid user ubuntu from 82.64.138.80 port 54273 ssh2 ...  | 
                    2019-10-26 06:29:55 | 
| 78.169.207.219 | attackbots | ENG,WP GET /wp-login.php  | 
                    2019-10-26 06:43:30 | 
| 45.67.14.199 | attackspambots | firewall-block, port(s): 27017/tcp  | 
                    2019-10-26 06:47:03 | 
| 46.101.27.6 | attackspam | Invalid user postgres from 46.101.27.6 port 41806  | 
                    2019-10-26 06:24:56 | 
| 123.58.6.86 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2019-10-26 06:56:02 | 
| 177.73.170.158 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2019-10-26 06:39:58 |