City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.18.140.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36128
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.18.140.16.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 22:34:51 CST 2025
;; MSG SIZE  rcvd: 105
        Host 16.140.18.57.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 16.140.18.57.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 104.129.194.91 | attack | odoo8 ...  | 
                    2020-06-26 08:45:15 | 
| 119.122.88.123 | attackspambots | Unauthorized connection attempt from IP address 119.122.88.123 on Port 445(SMB)  | 
                    2020-06-26 08:32:02 | 
| 185.39.11.57 | attackspam | Multiport scan : 21 ports scanned 30451 30453 30454 30459 30460 30461 30462 30464 30472 30473 30477 30479 30480 30482 30485 30486 30488 30491 30493 30498 30499  | 
                    2020-06-26 08:04:33 | 
| 183.134.77.250 | attackbotsspam | Invalid user alex from 183.134.77.250 port 39474  | 
                    2020-06-26 08:23:47 | 
| 77.222.109.84 | attack | Unauthorized connection attempt from IP address 77.222.109.84 on Port 445(SMB)  | 
                    2020-06-26 08:47:05 | 
| 153.180.22.175 | attackbotsspam | 20/6/25@16:45:06: FAIL: Alarm-Intrusion address from=153.180.22.175 ...  | 
                    2020-06-26 08:19:55 | 
| 222.186.30.76 | attack | Jun 26 00:39:11 game-panel sshd[28160]: Failed password for root from 222.186.30.76 port 28624 ssh2 Jun 26 00:39:13 game-panel sshd[28160]: Failed password for root from 222.186.30.76 port 28624 ssh2 Jun 26 00:39:15 game-panel sshd[28160]: Failed password for root from 222.186.30.76 port 28624 ssh2  | 
                    2020-06-26 08:50:02 | 
| 14.160.52.26 | attackbotsspam | Brute force attack to crack SMTP password (port 25 / 587)  | 
                    2020-06-26 08:22:22 | 
| 187.123.56.57 | attack | Jun 25 19:53:20 firewall sshd[32621]: Invalid user admin from 187.123.56.57 Jun 25 19:53:22 firewall sshd[32621]: Failed password for invalid user admin from 187.123.56.57 port 54217 ssh2 Jun 25 19:59:51 firewall sshd[321]: Invalid user ec2-user from 187.123.56.57 ...  | 
                    2020-06-26 08:04:13 | 
| 94.191.42.78 | attackbotsspam | 2020-06-25T23:42:05.139479abusebot-3.cloudsearch.cf sshd[27721]: Invalid user bank from 94.191.42.78 port 60028 2020-06-25T23:42:05.144512abusebot-3.cloudsearch.cf sshd[27721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.42.78 2020-06-25T23:42:05.139479abusebot-3.cloudsearch.cf sshd[27721]: Invalid user bank from 94.191.42.78 port 60028 2020-06-25T23:42:06.964782abusebot-3.cloudsearch.cf sshd[27721]: Failed password for invalid user bank from 94.191.42.78 port 60028 ssh2 2020-06-25T23:50:33.617664abusebot-3.cloudsearch.cf sshd[27741]: Invalid user postgres from 94.191.42.78 port 52346 2020-06-25T23:50:33.623061abusebot-3.cloudsearch.cf sshd[27741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.42.78 2020-06-25T23:50:33.617664abusebot-3.cloudsearch.cf sshd[27741]: Invalid user postgres from 94.191.42.78 port 52346 2020-06-25T23:50:35.849722abusebot-3.cloudsearch.cf sshd[27741]: Failed pas ...  | 
                    2020-06-26 08:24:04 | 
| 187.176.185.65 | attack | 
  | 
                    2020-06-26 08:23:35 | 
| 106.198.145.27 | attack | 1593117717 - 06/25/2020 22:41:57 Host: 106.198.145.27/106.198.145.27 Port: 445 TCP Blocked  | 
                    2020-06-26 08:32:26 | 
| 149.28.8.137 | attackspam | WordPress wp-login brute force :: 149.28.8.137 0.096 - [25/Jun/2020:20:44:59 0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1837 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"  | 
                    2020-06-26 08:52:46 | 
| 45.79.85.246 | attackspambots | Jun 25 22:19:55 Invalid user tester from 45.79.85.246 port 60014  | 
                    2020-06-26 08:34:11 | 
| 111.91.93.30 | attackbotsspam | Attempted to connect 4 times to port 88 TCP  | 
                    2020-06-26 08:11:59 |