City: unknown
Region: unknown
Country: Korea Republic of
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.16.128.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.16.128.149.			IN	A
;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 09:00:59 CST 2022
;; MSG SIZE  rcvd: 106
        Host 149.128.16.59.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 149.128.16.59.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 171.239.199.160 | attack | Honeypot attack, port: 81, PTR: dynamic-ip-adsl.viettel.vn.  | 
                    2020-07-15 20:56:18 | 
| 148.70.129.112 | attack | Invalid user admin from 148.70.129.112 port 26116  | 
                    2020-07-15 21:01:47 | 
| 212.70.149.51 | attackspambots | SMTP:25 2336 failed authentication attempts in 24 hours Attack from multiple 212.70.149.0/24  | 
                    2020-07-15 21:02:56 | 
| 187.95.42.186 | attackbots | Unauthorized connection attempt from IP address 187.95.42.186 on Port 445(SMB)  | 
                    2020-07-15 20:46:17 | 
| 141.98.9.161 | attackspam | 2020-07-15T14:16:40.318426shield sshd\[26895\]: Invalid user admin from 141.98.9.161 port 35819 2020-07-15T14:16:40.330843shield sshd\[26895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161 2020-07-15T14:16:42.475811shield sshd\[26895\]: Failed password for invalid user admin from 141.98.9.161 port 35819 ssh2 2020-07-15T14:17:08.917996shield sshd\[26951\]: Invalid user ubnt from 141.98.9.161 port 35975 2020-07-15T14:17:08.929766shield sshd\[26951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161  | 
                    2020-07-15 22:24:07 | 
| 14.231.254.159 | attackspam | Unauthorized connection attempt from IP address 14.231.254.159 on Port 445(SMB)  | 
                    2020-07-15 20:59:57 | 
| 13.70.177.141 | attackbotsspam | Unauthorized SSH login attempts  | 
                    2020-07-15 20:48:55 | 
| 114.33.59.198 | attackspam | Honeypot attack, port: 81, PTR: 114-33-59-198.HINET-IP.hinet.net.  | 
                    2020-07-15 20:47:10 | 
| 128.1.91.204 | attackspambots | Unwanted checking 80 or 443 port ...  | 
                    2020-07-15 20:58:14 | 
| 178.33.229.120 | attackspam | Invalid user produkcja from 178.33.229.120 port 52713  | 
                    2020-07-15 20:36:45 | 
| 2.187.64.108 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-07-15 20:37:30 | 
| 117.6.128.212 | attack | Unauthorized connection attempt from IP address 117.6.128.212 on Port 445(SMB)  | 
                    2020-07-15 20:42:19 | 
| 86.164.151.183 | attackspam | Automatic report - Port Scan Attack  | 
                    2020-07-15 22:22:57 | 
| 108.59.0.103 | attackspam | 108.59.0.103 was recorded 5 times by 4 hosts attempting to connect to the following ports: 16050,26050. Incident counter (4h, 24h, all-time): 5, 16, 59  | 
                    2020-07-15 20:37:03 | 
| 40.85.226.217 | attackbots | Jul 15 15:53:49 ift sshd\[53535\]: Invalid user ift.org.ua from 40.85.226.217Jul 15 15:53:49 ift sshd\[53531\]: Invalid user org from 40.85.226.217Jul 15 15:53:51 ift sshd\[53535\]: Failed password for invalid user ift.org.ua from 40.85.226.217 port 8974 ssh2Jul 15 15:53:51 ift sshd\[53531\]: Failed password for invalid user org from 40.85.226.217 port 8973 ssh2Jul 15 15:53:52 ift sshd\[53532\]: Failed password for ift from 40.85.226.217 port 8972 ssh2 ...  | 
                    2020-07-15 20:55:28 |