City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.56.121.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.56.121.14.			IN	A
;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123100 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 18:03:23 CST 2021
;; MSG SIZE  rcvd: 105Host 14.121.56.93.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 14.121.56.93.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 182.209.71.94 | attackbots | May 13 13:13:33 legacy sshd[31350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.209.71.94 May 13 13:13:35 legacy sshd[31350]: Failed password for invalid user omega from 182.209.71.94 port 9196 ssh2 May 13 13:18:45 legacy sshd[31577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.209.71.94 ... | 2020-05-13 19:27:33 | 
| 129.211.65.70 | attack | $f2bV_matches | 2020-05-13 19:22:13 | 
| 93.174.93.218 | attack | Port scan(s) (1) denied | 2020-05-13 19:25:45 | 
| 49.235.90.32 | attack | Invalid user hl2dmserver from 49.235.90.32 port 35352 | 2020-05-13 19:41:09 | 
| 167.71.176.84 | attackspambots | May 13 12:59:31 master sshd[30521]: Failed password for invalid user moon from 167.71.176.84 port 34508 ssh2 May 13 13:09:42 master sshd[30546]: Failed password for invalid user postgres from 167.71.176.84 port 38804 ssh2 | 2020-05-13 19:12:53 | 
| 188.166.5.84 | attack | firewall-block, port(s): 21564/tcp | 2020-05-13 19:13:19 | 
| 161.53.178.35 | attackbots | Bruteforce detected by fail2ban | 2020-05-13 19:45:41 | 
| 195.54.167.11 | attackspam | May 13 13:27:20 debian-2gb-nbg1-2 kernel: \[11628098.755357\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.11 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=58644 PROTO=TCP SPT=47434 DPT=2911 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-05-13 19:44:50 | 
| 106.12.8.103 | attack | 2020-05-13T06:01:20.940615homeassistant sshd[7854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.8.103 user=root 2020-05-13T06:01:23.160158homeassistant sshd[7854]: Failed password for root from 106.12.8.103 port 36162 ssh2 ... | 2020-05-13 19:02:58 | 
| 190.36.21.127 | attack | SMB Server BruteForce Attack | 2020-05-13 19:07:51 | 
| 106.13.21.24 | attackspambots | 2020-05-13T08:01:19.199397 sshd[4922]: Invalid user lundi from 106.13.21.24 port 41488 2020-05-13T08:01:19.213420 sshd[4922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.21.24 2020-05-13T08:01:19.199397 sshd[4922]: Invalid user lundi from 106.13.21.24 port 41488 2020-05-13T08:01:20.960137 sshd[4922]: Failed password for invalid user lundi from 106.13.21.24 port 41488 ssh2 ... | 2020-05-13 19:09:12 | 
| 94.28.101.166 | attack | Invalid user ubuntu from 94.28.101.166 port 33566 | 2020-05-13 19:42:07 | 
| 128.199.44.102 | attackbots | SSH brute-force attempt | 2020-05-13 19:24:43 | 
| 92.86.118.153 | attackspambots | firewall-block, port(s): 81/tcp | 2020-05-13 19:27:56 | 
| 193.112.143.141 | attackspambots | 2020-05-13T10:56:16.863881ns386461 sshd\[10754\]: Invalid user qh from 193.112.143.141 port 43768 2020-05-13T10:56:16.868411ns386461 sshd\[10754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.143.141 2020-05-13T10:56:19.004902ns386461 sshd\[10754\]: Failed password for invalid user qh from 193.112.143.141 port 43768 ssh2 2020-05-13T11:04:44.827457ns386461 sshd\[18664\]: Invalid user info from 193.112.143.141 port 47852 2020-05-13T11:04:44.832126ns386461 sshd\[18664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.143.141 ... | 2020-05-13 19:01:54 |