City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.49.221.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;8.49.221.136.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011702 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 18 10:04:18 CST 2025
;; MSG SIZE  rcvd: 105Host 136.221.49.8.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 136.221.49.8.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 190.194.157.178 | attackspam | May 13 01:05:01 srv01 sshd[25979]: reveeclipse mapping checking getaddrinfo for 178-157-194-190.cab.prima.net.ar [190.194.157.178] failed - POSSIBLE BREAK-IN ATTEMPT! May 13 01:05:01 srv01 sshd[25979]: Invalid user ulus from 190.194.157.178 May 13 01:05:01 srv01 sshd[25979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.194.157.178 May 13 01:05:03 srv01 sshd[25979]: Failed password for invalid user ulus from 190.194.157.178 port 54092 ssh2 May 13 01:05:03 srv01 sshd[25979]: Received disconnect from 190.194.157.178: 11: Bye Bye [preauth] May 13 01:13:12 srv01 sshd[26382]: reveeclipse mapping checking getaddrinfo for 178-157-194-190.cab.prima.net.ar [190.194.157.178] failed - POSSIBLE BREAK-IN ATTEMPT! May 13 01:13:12 srv01 sshd[26382]: Invalid user oracle from 190.194.157.178 May 13 01:13:12 srv01 sshd[26382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.194.157.178 May 13 01:1........ ------------------------------- | 2020-05-14 03:55:32 | 
| 52.226.79.76 | attack | Invalid user ftptest from 52.226.79.76 port 50440 | 2020-05-14 04:02:43 | 
| 182.71.161.227 | attack | Unauthorized connection attempt from IP address 182.71.161.227 on Port 445(SMB) | 2020-05-14 04:24:17 | 
| 65.191.76.227 | attackbots | Auto Fail2Ban report, multiple SSH login attempts. | 2020-05-14 04:00:10 | 
| 85.105.203.208 | attackbotsspam | Unauthorized connection attempt from IP address 85.105.203.208 on Port 445(SMB) | 2020-05-14 04:04:06 | 
| 82.200.221.18 | attackbots | Unauthorized connection attempt from IP address 82.200.221.18 on Port 445(SMB) | 2020-05-14 04:11:19 | 
| 222.186.42.137 | attackbots | 05/13/2020-15:54:25.024192 222.186.42.137 Protocol: 6 ET SCAN Potential SSH Scan | 2020-05-14 03:59:30 | 
| 94.25.104.139 | attackspambots | Unauthorized connection attempt from IP address 94.25.104.139 on Port 445(SMB) | 2020-05-14 04:19:16 | 
| 109.225.107.159 | attack | Invalid user aainftp from 109.225.107.159 port 7832 | 2020-05-14 04:07:31 | 
| 187.19.151.158 | attack | Unauthorized connection attempt from IP address 187.19.151.158 on Port 445(SMB) | 2020-05-14 04:06:40 | 
| 139.99.218.54 | attack | Exploit Attempt | 2020-05-14 04:12:48 | 
| 89.248.168.218 | attackspambots | 05/13/2020-14:46:02.024078 89.248.168.218 Protocol: 6 ET DROP Dshield Block Listed Source group 1 | 2020-05-14 04:09:22 | 
| 73.41.116.240 | attackspambots | 2020-05-13T10:28:05.9506111495-001 sshd[30690]: Invalid user ubuntu from 73.41.116.240 port 37108 2020-05-13T10:28:07.5821781495-001 sshd[30690]: Failed password for invalid user ubuntu from 73.41.116.240 port 37108 ssh2 2020-05-13T10:32:21.8450111495-001 sshd[30812]: Invalid user wwwdata from 73.41.116.240 port 45254 2020-05-13T10:32:21.8525701495-001 sshd[30812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-41-116-240.hsd1.ca.comcast.net 2020-05-13T10:32:21.8450111495-001 sshd[30812]: Invalid user wwwdata from 73.41.116.240 port 45254 2020-05-13T10:32:23.6262081495-001 sshd[30812]: Failed password for invalid user wwwdata from 73.41.116.240 port 45254 ssh2 ... | 2020-05-14 04:27:27 | 
| 180.76.152.157 | attackbotsspam | $f2bV_matches | 2020-05-14 04:24:48 | 
| 95.23.32.223 | attackbotsspam | Automatic report - Port Scan Attack | 2020-05-14 04:18:49 |