City: unknown
Region: unknown
Country: Cyprus
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.106.208.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.106.208.230.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 15:42:24 CST 2025
;; MSG SIZE  rcvd: 107
        Host 230.208.106.91.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 230.208.106.91.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 61.191.55.33 | attackbotsspam | May 23 14:03:30 scw-6657dc sshd[18116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.191.55.33 May 23 14:03:30 scw-6657dc sshd[18116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.191.55.33 May 23 14:03:32 scw-6657dc sshd[18116]: Failed password for invalid user rah from 61.191.55.33 port 54123 ssh2 ...  | 
                    2020-05-23 22:35:48 | 
| 49.88.112.75 | attackbotsspam | May 23 16:57:32 dev0-dcde-rnet sshd[3302]: Failed password for root from 49.88.112.75 port 36503 ssh2 May 23 17:02:27 dev0-dcde-rnet sshd[3326]: Failed password for root from 49.88.112.75 port 64493 ssh2  | 
                    2020-05-23 23:05:48 | 
| 222.186.190.2 | attackbots | May 23 11:07:23 NPSTNNYC01T sshd[28628]: Failed password for root from 222.186.190.2 port 31704 ssh2 May 23 11:07:36 NPSTNNYC01T sshd[28628]: error: maximum authentication attempts exceeded for root from 222.186.190.2 port 31704 ssh2 [preauth] May 23 11:07:43 NPSTNNYC01T sshd[28684]: Failed password for root from 222.186.190.2 port 46318 ssh2 ...  | 
                    2020-05-23 23:09:14 | 
| 36.228.235.116 | attack | Unauthorized connection attempt from IP address 36.228.235.116 on Port 445(SMB)  | 
                    2020-05-23 23:03:36 | 
| 95.188.193.174 | attack | Unauthorized connection attempt from IP address 95.188.193.174 on Port 445(SMB)  | 
                    2020-05-23 22:30:29 | 
| 129.204.15.121 | attack | May 23 15:14:39 mout sshd[16354]: Invalid user lxt from 129.204.15.121 port 35270  | 
                    2020-05-23 23:01:09 | 
| 177.54.239.39 | attackbots | Unauthorized connection attempt from IP address 177.54.239.39 on Port 445(SMB)  | 
                    2020-05-23 23:02:00 | 
| 49.151.218.26 | attackbots | Unauthorized connection attempt from IP address 49.151.218.26 on Port 445(SMB)  | 
                    2020-05-23 22:31:30 | 
| 218.92.0.145 | attack | May 23 16:41:35 vmd48417 sshd[30427]: Failed password for root from 218.92.0.145 port 23899 ssh2  | 
                    2020-05-23 22:45:03 | 
| 180.242.223.91 | attackspambots | Unauthorized connection attempt from IP address 180.242.223.91 on Port 445(SMB)  | 
                    2020-05-23 22:55:37 | 
| 178.154.200.32 | attackspam | [Sat May 23 19:01:18.342927 2020] [:error] [pid 4513:tid 139717659076352] [client 178.154.200.32:36480] [client 178.154.200.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XskQjktsGCoDCfoWTFFXzwAAAhw"] ...  | 
                    2020-05-23 22:33:14 | 
| 129.204.19.9 | attackbots | May 23 12:01:06 *** sshd[3041]: Invalid user qyf from 129.204.19.9  | 
                    2020-05-23 22:40:01 | 
| 117.2.207.212 | attackbots | Unauthorized connection attempt from IP address 117.2.207.212 on Port 445(SMB)  | 
                    2020-05-23 22:28:44 | 
| 108.162.229.121 | attackbotsspam | As always with cloudflare  | 
                    2020-05-23 23:07:03 | 
| 140.213.34.244 | attackbotsspam | Unauthorized connection attempt from IP address 140.213.34.244 on Port 445(SMB)  | 
                    2020-05-23 22:58:11 |