City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.106.138.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;86.106.138.192.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 18:37:08 CST 2025
;; MSG SIZE  rcvd: 107
        Host 192.138.106.86.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 192.138.106.86.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 46.105.132.32 | attack | trying to access non-authorized port  | 
                    2020-02-15 00:22:03 | 
| 62.255.13.246 | attackspambots | firewall-block, port(s): 1433/tcp  | 
                    2020-02-15 00:14:15 | 
| 217.243.172.58 | attack | Feb 14 14:47:55 srv01 sshd[19512]: Invalid user alicja from 217.243.172.58 port 34446 Feb 14 14:47:55 srv01 sshd[19512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.243.172.58 Feb 14 14:47:55 srv01 sshd[19512]: Invalid user alicja from 217.243.172.58 port 34446 Feb 14 14:47:57 srv01 sshd[19512]: Failed password for invalid user alicja from 217.243.172.58 port 34446 ssh2 Feb 14 14:50:12 srv01 sshd[19674]: Invalid user zabbix from 217.243.172.58 port 57092 ...  | 
                    2020-02-15 00:12:00 | 
| 95.90.190.152 | attackbots | Honeypot attack, port: 5555, PTR: ip5f5abe98.dynamic.kabel-deutschland.de.  | 
                    2020-02-15 00:06:45 | 
| 115.79.186.254 | attackspambots | trying to access non-authorized port  | 
                    2020-02-15 00:10:40 | 
| 88.135.37.174 | attackspam | 1433/tcp 445/tcp... [2020-01-01/02-14]6pkt,2pt.(tcp)  | 
                    2020-02-14 23:49:51 | 
| 162.243.134.187 | spamattack | Attack on SMTP port 25, 587  | 
                    2020-02-14 23:44:31 | 
| 185.175.93.37 | attack | 02/14/2020-16:26:09.493994 185.175.93.37 Protocol: 6 ET DROP Dshield Block Listed Source group 1  | 
                    2020-02-15 00:03:10 | 
| 167.172.118.117 | attackbotsspam | Feb 14 15:06:17 hell sshd[16517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.118.117 Feb 14 15:06:19 hell sshd[16517]: Failed password for invalid user nagios from 167.172.118.117 port 60596 ssh2 ...  | 
                    2020-02-14 23:56:24 | 
| 89.144.47.246 | attackspambots | 02/14/2020-09:43:23.277878 89.144.47.246 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-02-15 00:03:51 | 
| 179.93.197.221 | attackspambots | Port probing on unauthorized port 81  | 
                    2020-02-15 00:19:20 | 
| 171.243.124.221 | attackbots | Automatic report - Port Scan Attack  | 
                    2020-02-15 00:32:45 | 
| 196.52.43.77 | attack | Server penetration trying other domain names than server publicly serves (ex https://localhost)  | 
                    2020-02-15 00:04:18 | 
| 114.237.188.247 | attack | Feb 14 14:50:04 grey postfix/smtpd\[12160\]: NOQUEUE: reject: RCPT from unknown\[114.237.188.247\]: 554 5.7.1 Service unavailable\; Client host \[114.237.188.247\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[114.237.188.247\]\; from=\  | 
                    2020-02-15 00:24:09 | 
| 188.27.241.253 | attackspam | Automatic report - Port Scan Attack  | 
                    2020-02-14 23:47:03 |