City: unknown
Region: unknown
Country: United States
Internet Service Provider: Softcom Internet Communications, Inc
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.39.194.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.39.194.241.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102300 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 01:37:35 CST 2025
;; MSG SIZE  rcvd: 106b'Host 241.194.39.70.in-addr.arpa not found: 2(SERVFAIL)
';; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53
** server can't find 241.194.39.70.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime | 
|---|---|---|---|
| 114.67.110.227 | attack | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) | 2020-06-03 12:32:47 | 
| 123.207.107.144 | attack | Jun 3 00:38:25 vps639187 sshd\[11125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.107.144 user=root Jun 3 00:38:27 vps639187 sshd\[11125\]: Failed password for root from 123.207.107.144 port 34894 ssh2 Jun 3 00:43:48 vps639187 sshd\[11243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.107.144 user=root ... | 2020-06-03 08:26:51 | 
| 51.77.151.147 | attack | Jun 3 09:20:58 gw1 sshd[31954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.151.147 Jun 3 09:21:00 gw1 sshd[31954]: Failed password for invalid user salinas from 51.77.151.147 port 60242 ssh2 ... | 2020-06-03 12:33:14 | 
| 128.14.180.110 | attackspambots | Multiple HTTP calls attempting to GET resources using common API calls or formats on port 8080 | 2020-06-03 08:23:40 | 
| 106.13.207.225 | attackbotsspam | 20 attempts against mh-ssh on echoip | 2020-06-03 12:20:51 | 
| 106.53.74.246 | attackspam | $f2bV_matches | 2020-06-03 12:08:30 | 
| 49.88.112.70 | attackspambots | 2020-06-02T23:59:40.589356shield sshd\[29764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70 user=root 2020-06-02T23:59:42.627813shield sshd\[29764\]: Failed password for root from 49.88.112.70 port 27724 ssh2 2020-06-02T23:59:45.153848shield sshd\[29764\]: Failed password for root from 49.88.112.70 port 27724 ssh2 2020-06-02T23:59:47.428896shield sshd\[29764\]: Failed password for root from 49.88.112.70 port 27724 ssh2 2020-06-03T00:00:27.266970shield sshd\[29959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70 user=root | 2020-06-03 08:21:37 | 
| 47.220.235.64 | attackspam | Jun 2 21:59:01 Host-KLAX-C sshd[15713]: User root from 47.220.235.64 not allowed because not listed in AllowUsers ... | 2020-06-03 12:27:04 | 
| 195.54.166.101 | attack | [H1.VM1] Blocked by UFW | 2020-06-03 12:26:00 | 
| 186.236.14.80 | attackspambots | (smtpauth) Failed SMTP AUTH login from 186.236.14.80 (BR/Brazil/80.14.236.186.futurasc.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-03 00:53:18 plain authenticator failed for ([186.236.14.80]) [186.236.14.80]: 535 Incorrect authentication data (set_id=training) | 2020-06-03 08:25:40 | 
| 141.98.81.6 | attackbotsspam | Automatic report - Banned IP Access | 2020-06-03 12:22:37 | 
| 61.246.7.145 | attackbots | Jun 3 05:55:04 vmi345603 sshd[31611]: Failed password for root from 61.246.7.145 port 50242 ssh2 ... | 2020-06-03 12:31:25 | 
| 187.39.158.10 | attack | SASL PLAIN auth failed: ruser=... | 2020-06-03 08:22:14 | 
| 141.98.81.207 | attackspambots | Bruteforce SSH attempt | 2020-06-03 12:28:29 | 
| 121.138.155.41 | attackspam | Unauthorized IMAP connection attempt | 2020-06-03 08:24:39 |