City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.139.194.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.139.194.86.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 19:29:10 CST 2025
;; MSG SIZE  rcvd: 10786.194.139.212.in-addr.arpa domain name pointer host-212-139-194-86.static.as9105.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
86.194.139.212.in-addr.arpa	name = host-212-139-194-86.static.as9105.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 68.183.234.12 | attack | Sep 5 04:28:28 php1 sshd\[2249\]: Invalid user demouser from 68.183.234.12 Sep 5 04:28:28 php1 sshd\[2249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12 Sep 5 04:28:30 php1 sshd\[2249\]: Failed password for invalid user demouser from 68.183.234.12 port 33900 ssh2 Sep 5 04:34:05 php1 sshd\[2761\]: Invalid user ftpuser1 from 68.183.234.12 Sep 5 04:34:05 php1 sshd\[2761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12 | 2019-09-05 22:43:27 | 
| 68.183.124.53 | attackbots | Sep 5 04:44:24 hcbb sshd\[28841\]: Invalid user support from 68.183.124.53 Sep 5 04:44:24 hcbb sshd\[28841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53 Sep 5 04:44:26 hcbb sshd\[28841\]: Failed password for invalid user support from 68.183.124.53 port 50960 ssh2 Sep 5 04:49:00 hcbb sshd\[29284\]: Invalid user temp from 68.183.124.53 Sep 5 04:49:00 hcbb sshd\[29284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53 | 2019-09-05 22:50:05 | 
| 49.88.112.80 | attackbots | 2019-09-05T14:45:25.540620abusebot-2.cloudsearch.cf sshd\[18327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.80 user=root | 2019-09-05 22:45:49 | 
| 110.35.173.103 | attackbots | Sep 5 12:25:09 localhost sshd\[57916\]: Invalid user q1w2e3 from 110.35.173.103 port 58804 Sep 5 12:25:09 localhost sshd\[57916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.103 Sep 5 12:25:11 localhost sshd\[57916\]: Failed password for invalid user q1w2e3 from 110.35.173.103 port 58804 ssh2 Sep 5 12:29:36 localhost sshd\[58062\]: Invalid user password from 110.35.173.103 port 44562 Sep 5 12:29:36 localhost sshd\[58062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.103 ... | 2019-09-05 23:31:57 | 
| 209.85.128.54 | attack | Attempt to login to email server on SMTP service on 05-09-2019 09:29:55. | 2019-09-05 23:16:57 | 
| 187.101.38.44 | attack | Sep 5 14:22:37 mail sshd\[25564\]: Invalid user guest from 187.101.38.44 port 37974 Sep 5 14:22:37 mail sshd\[25564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.101.38.44 Sep 5 14:22:38 mail sshd\[25564\]: Failed password for invalid user guest from 187.101.38.44 port 37974 ssh2 Sep 5 14:28:11 mail sshd\[26296\]: Invalid user ubuntu from 187.101.38.44 port 46506 Sep 5 14:28:11 mail sshd\[26296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.101.38.44 | 2019-09-05 23:22:55 | 
| 23.129.64.168 | attackbots | Sep 5 15:24:53 thevastnessof sshd[29860]: Failed password for root from 23.129.64.168 port 31778 ssh2 ... | 2019-09-05 23:38:54 | 
| 77.247.109.29 | attack | 05.09.2019 12:25:48 Connection to port 56060 blocked by firewall | 2019-09-05 22:42:46 | 
| 42.113.219.248 | attackbotsspam | Unauthorized connection attempt from IP address 42.113.219.248 on Port 445(SMB) | 2019-09-05 22:32:29 | 
| 51.255.197.164 | attackspambots | Sep 5 12:37:39 yabzik sshd[16227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.197.164 Sep 5 12:37:41 yabzik sshd[16227]: Failed password for invalid user testtest from 51.255.197.164 port 58171 ssh2 Sep 5 12:42:20 yabzik sshd[18776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.197.164 | 2019-09-05 23:31:08 | 
| 51.253.101.98 | attack | SpamReport | 2019-09-05 23:00:49 | 
| 119.123.130.173 | attack | SpamReport | 2019-09-05 22:57:56 | 
| 209.85.208.46 | attackbotsspam | Attempt to login to email server on SMTP service on 05-09-2019 09:45:33. | 2019-09-05 22:37:00 | 
| 35.189.237.181 | attackspam | $f2bV_matches | 2019-09-05 22:55:13 | 
| 209.85.160.170 | attackspam | Attempt to login to email server on SMTP service on 05-09-2019 09:45:31. | 2019-09-05 23:13:39 |