City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.80.145.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.80.145.205.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 21:48:42 CST 2025
;; MSG SIZE  rcvd: 106Host 205.145.80.55.in-addr.arpa. not found: 3(NXDOMAIN)
server can't find 55.80.145.205.in-addr.arpa: SERVFAIL| IP | Type | Details | Datetime | 
|---|---|---|---|
| 159.89.53.76 | attack | firewall-block, port(s): 522/tcp | 2020-04-25 05:31:16 | 
| 200.150.69.26 | attackbots | 04/24/2020-16:30:10.683547 200.150.69.26 Protocol: 6 ET SCAN NMAP -sS window 1024 | 2020-04-25 05:36:59 | 
| 80.76.42.150 | attackspambots | (sshd) Failed SSH login from 80.76.42.150 (RU/Russia/time20.lion1.icu): 5 in the last 3600 secs | 2020-04-25 06:07:41 | 
| 54.38.43.97 | attack | IP: 54.38.43.97
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 23%
ASN Details
   AS16276 OVH SAS
   France (FR)
   CIDR 54.36.0.0/14
Log Date: 24/04/2020 8:06:13 PM UTC | 2020-04-25 05:32:56 | 
| 103.23.125.255 | attackbots | IP: 103.23.125.255
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS133320 Alpha Infolab Private limited
   India (IN)
   CIDR 103.23.124.0/22
Log Date: 24/04/2020 8:14:16 PM UTC | 2020-04-25 05:53:52 | 
| 49.88.112.111 | attackspam | April 24 2020, 21:46:35 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban. | 2020-04-25 06:03:25 | 
| 106.51.98.159 | attack | Apr 24 15:06:34 server1 sshd\[8315\]: Invalid user backups from 106.51.98.159 Apr 24 15:06:34 server1 sshd\[8315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.98.159 Apr 24 15:06:35 server1 sshd\[8315\]: Failed password for invalid user backups from 106.51.98.159 port 60806 ssh2 Apr 24 15:10:34 server1 sshd\[9719\]: Invalid user pdv from 106.51.98.159 Apr 24 15:10:34 server1 sshd\[9719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.98.159 ... | 2020-04-25 05:33:50 | 
| 185.156.73.38 | attack | Apr 24 23:40:18 debian-2gb-nbg1-2 kernel: \[10023361.457988\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.38 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=11773 PROTO=TCP SPT=51041 DPT=2106 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-04-25 06:06:36 | 
| 134.209.208.159 | attackbotsspam | firewall-block, port(s): 22225/tcp | 2020-04-25 05:33:25 | 
| 209.17.96.18 | attack | IP: 209.17.96.18
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS174 COGENT-174
   United States (US)
   CIDR 209.17.96.0/20
Log Date: 24/04/2020 8:03:33 PM UTC | 2020-04-25 05:36:39 | 
| 51.81.254.27 | attackspam | CMS (WordPress or Joomla) login attempt. | 2020-04-25 05:39:57 | 
| 190.235.3.132 | attackbotsspam | Unauthorized connection attempt from IP address 190.235.3.132 on Port 445(SMB) | 2020-04-25 05:40:41 | 
| 66.70.173.63 | attackbotsspam | SSH brutforce | 2020-04-25 05:32:29 | 
| 45.143.220.54 | attackbots | IP: 45.143.220.54
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS209299 Vitox Telecom
   Netherlands (NL)
   CIDR 45.143.220.0/23
Log Date: 24/04/2020 7:45:01 PM UTC | 2020-04-25 05:35:12 | 
| 138.68.81.162 | attack | SSH Invalid Login | 2020-04-25 05:51:10 |