City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.101.102.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.101.102.160.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 18:37:54 CST 2025
;; MSG SIZE  rcvd: 107
        Host 160.102.101.64.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 160.102.101.64.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 49.234.28.109 | attackspam | Jun 15 09:36:25 ny01 sshd[2399]: Failed password for root from 49.234.28.109 port 41344 ssh2 Jun 15 09:40:45 ny01 sshd[2958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.109 Jun 15 09:40:48 ny01 sshd[2958]: Failed password for invalid user SSH-2.0-OpenSSH_7.2p2 from 49.234.28.109 port 58082 ssh2  | 
                    2020-06-16 03:14:45 | 
| 185.216.140.6 | attack | 185.216.140.6 - - [15/Jun/2020:14:49:15 -0400] "GET / HTTP/1.1" 200 757 "-" "Mozilla/5.0 zgrab/0.x"  | 
                    2020-06-16 02:59:57 | 
| 93.56.160.103 | attack | Unauthorized connection attempt from IP address 93.56.160.103 on Port 445(SMB)  | 
                    2020-06-16 03:11:27 | 
| 180.140.243.207 | attack | Jun 15 15:30:20 nextcloud sshd\[8422\]: Invalid user big from 180.140.243.207 Jun 15 15:30:20 nextcloud sshd\[8422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.140.243.207 Jun 15 15:30:22 nextcloud sshd\[8422\]: Failed password for invalid user big from 180.140.243.207 port 47148 ssh2  | 
                    2020-06-16 03:21:56 | 
| 200.212.133.226 | attack | Unauthorized connection attempt from IP address 200.212.133.226 on Port 445(SMB)  | 
                    2020-06-16 02:59:21 | 
| 92.222.156.151 | attackbotsspam | Jun 15 18:38:41 XXX sshd[23735]: Invalid user patrick from 92.222.156.151 port 57338  | 
                    2020-06-16 03:14:26 | 
| 190.36.149.156 | attackbots | Unauthorized connection attempt from IP address 190.36.149.156 on Port 445(SMB)  | 
                    2020-06-16 03:04:09 | 
| 106.13.188.35 | attack | $f2bV_matches  | 
                    2020-06-16 03:24:31 | 
| 74.82.47.3 | attackspam | Unauthorized connection attempt detected from IP address 74.82.47.3 to port 631  | 
                    2020-06-16 02:56:51 | 
| 93.217.162.77 | attackbotsspam | Automatic report - Port Scan Attack  | 
                    2020-06-16 03:17:42 | 
| 222.186.175.150 | attack | Jun 15 14:40:16 NPSTNNYC01T sshd[6521]: Failed password for root from 222.186.175.150 port 28220 ssh2 Jun 15 14:40:30 NPSTNNYC01T sshd[6521]: error: maximum authentication attempts exceeded for root from 222.186.175.150 port 28220 ssh2 [preauth] Jun 15 14:40:36 NPSTNNYC01T sshd[6534]: Failed password for root from 222.186.175.150 port 54300 ssh2 ...  | 
                    2020-06-16 02:47:07 | 
| 172.108.142.146 | attackbotsspam | Unauthorized connection attempt from IP address 172.108.142.146 on Port 445(SMB)  | 
                    2020-06-16 02:55:49 | 
| 5.153.134.23 | attackspambots | $f2bV_matches  | 
                    2020-06-16 02:52:30 | 
| 102.130.119.172 | attackbotsspam | 20 attempts against mh-misbehave-ban on dawn  | 
                    2020-06-16 03:15:59 | 
| 130.105.63.214 | attackspam | Unauthorized connection attempt from IP address 130.105.63.214 on Port 445(SMB)  | 
                    2020-06-16 02:54:02 |