City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.89.58.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60562
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.89.58.240.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 13:41:01 CST 2025
;; MSG SIZE  rcvd: 105
        240.58.89.99.in-addr.arpa domain name pointer 99-89-58-240.lightspeed.hstntx.sbcglobal.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
240.58.89.99.in-addr.arpa	name = 99-89-58-240.lightspeed.hstntx.sbcglobal.net.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 146.88.240.4 | attackbots | Jun 28 08:05:08 debian-2gb-nbg1-2 kernel: \[15582956.924144\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=146.88.240.4 DST=195.201.40.59 LEN=37 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=UDP SPT=50915 DPT=7777 LEN=17  | 
                    2020-06-28 14:18:25 | 
| 219.151.155.247 | attackbotsspam | Jun 28 07:13:54 ns41 sshd[32152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.151.155.247  | 
                    2020-06-28 14:24:35 | 
| 79.249.244.25 | attackbotsspam | Lines containing failures of 79.249.244.25 Jun 28 06:28:59 shared01 sshd[31706]: Invalid user pi from 79.249.244.25 port 46758 Jun 28 06:28:59 shared01 sshd[31707]: Invalid user pi from 79.249.244.25 port 46762 Jun 28 06:28:59 shared01 sshd[31706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.249.244.25 Jun 28 06:28:59 shared01 sshd[31707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.249.244.25 Jun 28 06:29:02 shared01 sshd[31706]: Failed password for invalid user pi from 79.249.244.25 port 46758 ssh2 Jun 28 06:29:02 shared01 sshd[31707]: Failed password for invalid user pi from 79.249.244.25 port 46762 ssh2 Jun 28 06:29:02 shared01 sshd[31706]: Connection closed by invalid user pi 79.249.244.25 port 46758 [preauth] Jun 28 06:29:02 shared01 sshd[31707]: Connection closed by invalid user pi 79.249.244.25 port 46762 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.htm  | 
                    2020-06-28 14:52:13 | 
| 222.186.173.215 | attack | Jun 28 09:44:38 ift sshd\[7778\]: Failed password for root from 222.186.173.215 port 5616 ssh2Jun 28 09:44:41 ift sshd\[7778\]: Failed password for root from 222.186.173.215 port 5616 ssh2Jun 28 09:44:51 ift sshd\[7778\]: Failed password for root from 222.186.173.215 port 5616 ssh2Jun 28 09:45:03 ift sshd\[7820\]: Failed password for root from 222.186.173.215 port 4156 ssh2Jun 28 09:45:12 ift sshd\[7820\]: Failed password for root from 222.186.173.215 port 4156 ssh2 ...  | 
                    2020-06-28 14:46:49 | 
| 85.185.149.28 | attackbots | 2020-06-28T10:54:00.873337hostname sshd[103771]: Invalid user natalie from 85.185.149.28 port 36471 ...  | 
                    2020-06-28 14:50:52 | 
| 114.67.110.227 | attackspam | $f2bV_matches  | 
                    2020-06-28 14:07:08 | 
| 193.169.255.18 | attack | Jun 28 08:30:38 ns3042688 courier-pop3d: LOGIN FAILED, user=test@alyco-tools.eu, ip=\[::ffff:193.169.255.18\] ...  | 
                    2020-06-28 14:43:41 | 
| 142.44.162.188 | attackbots | web-1 [ssh_2] SSH Attack  | 
                    2020-06-28 14:42:47 | 
| 45.95.168.176 | attack | unauthorized connection attempt  | 
                    2020-06-28 14:22:46 | 
| 93.191.20.34 | attackbots | (sshd) Failed SSH login from 93.191.20.34 (RU/Russia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 28 07:17:59 elude sshd[19604]: Invalid user vicent from 93.191.20.34 port 37200 Jun 28 07:18:01 elude sshd[19604]: Failed password for invalid user vicent from 93.191.20.34 port 37200 ssh2 Jun 28 07:27:10 elude sshd[20967]: Invalid user jie from 93.191.20.34 port 55548 Jun 28 07:27:11 elude sshd[20967]: Failed password for invalid user jie from 93.191.20.34 port 55548 ssh2 Jun 28 07:31:41 elude sshd[21728]: Invalid user sentry from 93.191.20.34 port 52490  | 
                    2020-06-28 14:25:10 | 
| 103.93.181.10 | attackbotsspam | Jun 28 05:26:50 ns382633 sshd\[13615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.181.10 user=root Jun 28 05:26:52 ns382633 sshd\[13615\]: Failed password for root from 103.93.181.10 port 59600 ssh2 Jun 28 05:54:43 ns382633 sshd\[18355\]: Invalid user postgres from 103.93.181.10 port 41642 Jun 28 05:54:43 ns382633 sshd\[18355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.181.10 Jun 28 05:54:45 ns382633 sshd\[18355\]: Failed password for invalid user postgres from 103.93.181.10 port 41642 ssh2  | 
                    2020-06-28 14:20:20 | 
| 198.46.189.106 | attackspam | 2020-06-28T04:09:23.343170abusebot.cloudsearch.cf sshd[19465]: Invalid user mz from 198.46.189.106 port 55064 2020-06-28T04:09:23.349477abusebot.cloudsearch.cf sshd[19465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.189.106 2020-06-28T04:09:23.343170abusebot.cloudsearch.cf sshd[19465]: Invalid user mz from 198.46.189.106 port 55064 2020-06-28T04:09:25.005947abusebot.cloudsearch.cf sshd[19465]: Failed password for invalid user mz from 198.46.189.106 port 55064 ssh2 2020-06-28T04:15:22.486007abusebot.cloudsearch.cf sshd[19520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.189.106 user=root 2020-06-28T04:15:24.759767abusebot.cloudsearch.cf sshd[19520]: Failed password for root from 198.46.189.106 port 44836 ssh2 2020-06-28T04:19:16.956902abusebot.cloudsearch.cf sshd[19591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.189.106 user=root 2 ...  | 
                    2020-06-28 14:16:49 | 
| 50.62.208.149 | attack | Trolling for resource vulnerabilities  | 
                    2020-06-28 14:30:25 | 
| 106.13.41.87 | attack | Invalid user marvin from 106.13.41.87 port 43660  | 
                    2020-06-28 14:34:18 | 
| 218.92.0.145 | attack | Jun 28 01:58:25 NPSTNNYC01T sshd[8259]: Failed password for root from 218.92.0.145 port 30824 ssh2 Jun 28 01:58:29 NPSTNNYC01T sshd[8259]: Failed password for root from 218.92.0.145 port 30824 ssh2 Jun 28 01:58:32 NPSTNNYC01T sshd[8259]: Failed password for root from 218.92.0.145 port 30824 ssh2 Jun 28 01:58:39 NPSTNNYC01T sshd[8259]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 30824 ssh2 [preauth] ...  | 
                    2020-06-28 14:33:43 |