City: unknown
Region: unknown
Country: Finland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.214.164.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.214.164.22.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 19:29:54 CST 2025
;; MSG SIZE  rcvd: 106Host 22.164.214.91.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 22.164.214.91.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 65.229.5.158 | attackspambots | leo_www | 2019-12-20 06:12:27 | 
| 113.190.226.220 | attackbots | Unauthorized connection attempt from IP address 113.190.226.220 on Port 445(SMB) | 2019-12-20 05:54:59 | 
| 134.209.170.127 | attackspam | Dec 19 17:15:45 mail sshd[7888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.170.127 Dec 19 17:15:46 mail sshd[7888]: Failed password for invalid user minimum from 134.209.170.127 port 42584 ssh2 Dec 19 17:21:27 mail sshd[9048]: Failed password for root from 134.209.170.127 port 56572 ssh2 | 2019-12-20 06:10:55 | 
| 62.173.145.147 | attackspambots | Dec 19 10:58:37 linuxvps sshd\[8002\]: Invalid user yoyo from 62.173.145.147 Dec 19 10:58:37 linuxvps sshd\[8002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.173.145.147 Dec 19 10:58:39 linuxvps sshd\[8002\]: Failed password for invalid user yoyo from 62.173.145.147 port 39158 ssh2 Dec 19 11:04:17 linuxvps sshd\[11695\]: Invalid user sorbi from 62.173.145.147 Dec 19 11:04:17 linuxvps sshd\[11695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.173.145.147 | 2019-12-20 06:21:11 | 
| 37.139.24.190 | attackbotsspam | Dec 20 00:25:14 server sshd\[17354\]: Invalid user admin from 37.139.24.190 Dec 20 00:25:14 server sshd\[17354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.24.190 Dec 20 00:25:16 server sshd\[17354\]: Failed password for invalid user admin from 37.139.24.190 port 36984 ssh2 Dec 20 00:37:12 server sshd\[20469\]: Invalid user hasted from 37.139.24.190 Dec 20 00:37:12 server sshd\[20469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.24.190 ... | 2019-12-20 06:22:17 | 
| 80.68.3.226 | attackspam | Unauthorized connection attempt detected from IP address 80.68.3.226 to port 445 | 2019-12-20 06:18:47 | 
| 106.52.174.139 | attackspambots | detected by Fail2Ban | 2019-12-20 06:27:20 | 
| 180.250.214.25 | attackbots | 2019-12-19T22:47:52.342036vps751288.ovh.net sshd\[665\]: Invalid user asterisk from 180.250.214.25 port 55184 2019-12-19T22:47:52.351455vps751288.ovh.net sshd\[665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.214.25 2019-12-19T22:47:54.703420vps751288.ovh.net sshd\[665\]: Failed password for invalid user asterisk from 180.250.214.25 port 55184 ssh2 2019-12-19T22:54:08.038272vps751288.ovh.net sshd\[702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.214.25 user=dbus 2019-12-19T22:54:10.340392vps751288.ovh.net sshd\[702\]: Failed password for dbus from 180.250.214.25 port 60554 ssh2 | 2019-12-20 06:27:04 | 
| 177.94.219.199 | attackbots | Unauthorized connection attempt detected from IP address 177.94.219.199 to port 445 | 2019-12-20 06:07:17 | 
| 165.16.37.160 | attackbotsspam | port scan and connect, tcp 80 (http) | 2019-12-20 05:57:34 | 
| 103.196.52.136 | attackbots | Unauthorized connection attempt from IP address 103.196.52.136 on Port 445(SMB) | 2019-12-20 06:16:23 | 
| 143.208.79.179 | attackspam | Unauthorized connection attempt from IP address 143.208.79.179 on Port 445(SMB) | 2019-12-20 06:08:19 | 
| 91.121.87.174 | attack | Invalid user backup from 91.121.87.174 port 55366 | 2019-12-20 06:02:15 | 
| 118.70.127.173 | attackbotsspam | Unauthorized connection attempt detected from IP address 118.70.127.173 to port 445 | 2019-12-20 06:18:33 | 
| 188.163.109.153 | attackbots | fell into ViewStateTrap:oslo | 2019-12-20 06:17:33 |