City: Frankfurt am Main
Region: Hessen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.22.89.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.22.89.80. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025042500 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 25 20:43:16 CST 2025
;; MSG SIZE rcvd: 105
80.89.22.149.in-addr.arpa domain name pointer unn-149-22-89-80.datapacket.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.89.22.149.in-addr.arpa name = unn-149-22-89-80.datapacket.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 186.147.237.51 | attackspambots | Sep 30 23:20:57 MK-Soft-VM4 sshd[854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.237.51 Sep 30 23:20:59 MK-Soft-VM4 sshd[854]: Failed password for invalid user kiss from 186.147.237.51 port 36204 ssh2 ... |
2019-10-01 05:28:43 |
| 194.36.174.15 | attack | ssh intrusion attempt |
2019-10-01 05:33:10 |
| 116.111.151.105 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/116.111.151.105/ VN - 1H : (82) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : VN NAME ASN : ASN24086 IP : 116.111.151.105 CIDR : 116.111.144.0/21 PREFIX COUNT : 402 UNIQUE IP COUNT : 742400 WYKRYTE ATAKI Z ASN24086 : 1H - 1 3H - 2 6H - 2 12H - 3 24H - 3 INFO : SERVER - Looking for resource vulnerabilities Detected and Blocked by ADMIN - data recovery |
2019-10-01 05:25:10 |
| 141.98.81.38 | attackspambots | Invalid user admin from 141.98.81.38 port 62031 |
2019-10-01 05:05:43 |
| 112.169.152.105 | attackspambots | 2019-09-30T16:50:19.8349131495-001 sshd\[8492\]: Invalid user qody from 112.169.152.105 port 33988 2019-09-30T16:50:19.8421481495-001 sshd\[8492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.152.105 2019-09-30T16:50:21.6068521495-001 sshd\[8492\]: Failed password for invalid user qody from 112.169.152.105 port 33988 ssh2 2019-09-30T16:55:03.6488191495-001 sshd\[8830\]: Invalid user zena from 112.169.152.105 port 46990 2019-09-30T16:55:03.6558891495-001 sshd\[8830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.152.105 2019-09-30T16:55:06.4090881495-001 sshd\[8830\]: Failed password for invalid user zena from 112.169.152.105 port 46990 ssh2 ... |
2019-10-01 05:15:58 |
| 122.195.200.148 | attackbots | 2019-09-30T21:30:06.223847hub.schaetter.us sshd\[8461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148 user=root 2019-09-30T21:30:08.013662hub.schaetter.us sshd\[8461\]: Failed password for root from 122.195.200.148 port 47902 ssh2 2019-09-30T21:30:10.632454hub.schaetter.us sshd\[8461\]: Failed password for root from 122.195.200.148 port 47902 ssh2 2019-09-30T21:30:12.516457hub.schaetter.us sshd\[8461\]: Failed password for root from 122.195.200.148 port 47902 ssh2 2019-09-30T21:32:07.056930hub.schaetter.us sshd\[8483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148 user=root ... |
2019-10-01 05:34:16 |
| 191.242.246.150 | attackspam | Automatic report - Port Scan Attack |
2019-10-01 05:21:48 |
| 62.234.9.150 | attack | Sep 30 23:23:45 dedicated sshd[15152]: Invalid user webmaster from 62.234.9.150 port 55758 |
2019-10-01 05:40:03 |
| 148.70.11.98 | attack | Sep 30 11:12:15 sachi sshd\[4250\]: Invalid user 1415926 from 148.70.11.98 Sep 30 11:12:15 sachi sshd\[4250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.11.98 Sep 30 11:12:16 sachi sshd\[4250\]: Failed password for invalid user 1415926 from 148.70.11.98 port 39696 ssh2 Sep 30 11:16:23 sachi sshd\[4578\]: Invalid user editor from 148.70.11.98 Sep 30 11:16:23 sachi sshd\[4578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.11.98 |
2019-10-01 05:21:28 |
| 49.247.132.79 | attackbots | Sep 30 21:26:45 hcbbdb sshd\[25468\]: Invalid user sn from 49.247.132.79 Sep 30 21:26:45 hcbbdb sshd\[25468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.132.79 Sep 30 21:26:47 hcbbdb sshd\[25468\]: Failed password for invalid user sn from 49.247.132.79 port 45492 ssh2 Sep 30 21:31:03 hcbbdb sshd\[25955\]: Invalid user ubnt from 49.247.132.79 Sep 30 21:31:03 hcbbdb sshd\[25955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.132.79 |
2019-10-01 05:36:30 |
| 222.186.180.20 | attackspambots | 2019-09-28 06:33:07 -> 2019-09-30 21:50:03 : 72 login attempts (222.186.180.20) |
2019-10-01 05:15:12 |
| 117.212.94.124 | attackspambots | Chat Spam |
2019-10-01 05:15:38 |
| 119.28.222.88 | attackspambots | Sep 30 22:55:29 MK-Soft-VM5 sshd[7963]: Failed password for root from 119.28.222.88 port 59024 ssh2 Sep 30 22:59:55 MK-Soft-VM5 sshd[7990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.222.88 ... |
2019-10-01 05:16:28 |
| 14.29.251.33 | attackspam | Sep 30 23:20:00 localhost sshd\[25948\]: Invalid user yx from 14.29.251.33 port 62896 Sep 30 23:20:00 localhost sshd\[25948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.251.33 Sep 30 23:20:02 localhost sshd\[25948\]: Failed password for invalid user yx from 14.29.251.33 port 62896 ssh2 |
2019-10-01 05:24:44 |
| 24.4.128.213 | attackspam | Oct 1 04:31:46 webhost01 sshd[18052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.4.128.213 Oct 1 04:31:47 webhost01 sshd[18052]: Failed password for invalid user user1 from 24.4.128.213 port 41176 ssh2 ... |
2019-10-01 05:36:03 |