City: unknown
Region: unknown
Country: France
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.116.110.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;163.116.110.80.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 10:42:03 CST 2025
;; MSG SIZE  rcvd: 107Host 80.110.116.163.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 80.110.116.163.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 160.202.161.233 | attackbots | Port 1433 Scan | 2020-02-07 03:13:03 | 
| 112.85.42.186 | attackbotsspam | Feb 7 00:44:09 areeb-Workstation sshd[13235]: Failed password for root from 112.85.42.186 port 47152 ssh2 Feb 7 00:44:12 areeb-Workstation sshd[13235]: Failed password for root from 112.85.42.186 port 47152 ssh2 ... | 2020-02-07 03:22:02 | 
| 47.90.123.88 | attack | 3389BruteforceFW22 | 2020-02-07 02:49:56 | 
| 185.40.4.94 | attack | MultiHost/MultiPort Probe, Scan, Hack - | 2020-02-07 03:20:48 | 
| 177.129.255.94 | attackbots | Port 1433 Scan | 2020-02-07 03:10:49 | 
| 137.63.246.39 | attackbotsspam | $f2bV_matches | 2020-02-07 03:00:43 | 
| 117.94.81.147 | attack | Feb 6 20:07:45 lnxded64 sshd[15155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.94.81.147 Feb 6 20:07:45 lnxded64 sshd[15155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.94.81.147 | 2020-02-07 03:07:48 | 
| 14.174.62.104 | attack | Lines containing failures of 14.174.62.104 Feb 6 05:39:03 Tosca sshd[20430]: Did not receive identification string from 14.174.62.104 port 58415 Feb 6 05:39:05 Tosca sshd[20447]: User r.r from 14.174.62.104 not allowed because none of user's groups are listed in AllowGroups Feb 6 05:39:05 Tosca sshd[20447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.174.62.104 user=r.r Feb 6 05:39:07 Tosca sshd[20447]: Failed password for invalid user r.r from 14.174.62.104 port 59007 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.174.62.104 | 2020-02-07 03:20:35 | 
| 148.70.223.29 | attack | $f2bV_matches | 2020-02-07 03:25:39 | 
| 63.80.190.160 | attackspambots | TCP Port: 25 invalid blocked spamcop also zen-spamhaus and spam-sorbs (325) | 2020-02-07 03:16:32 | 
| 107.170.121.10 | attackspam | Feb 6 19:01:30 web8 sshd\[30855\]: Invalid user det from 107.170.121.10 Feb 6 19:01:31 web8 sshd\[30855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.121.10 Feb 6 19:01:32 web8 sshd\[30855\]: Failed password for invalid user det from 107.170.121.10 port 36396 ssh2 Feb 6 19:06:32 web8 sshd\[1126\]: Invalid user jr from 107.170.121.10 Feb 6 19:06:32 web8 sshd\[1126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.121.10 | 2020-02-07 03:12:10 | 
| 186.170.28.202 | attackbots | 20/2/6@08:41:04: FAIL: Alarm-Network address from=186.170.28.202 ... | 2020-02-07 03:03:48 | 
| 103.242.47.66 | attackspam | Port 1433 Scan | 2020-02-07 03:26:02 | 
| 159.203.73.181 | attackspam | $f2bV_matches | 2020-02-07 03:26:59 | 
| 165.227.89.212 | attackspambots | $f2bV_matches | 2020-02-07 03:01:39 |