City: unknown
Region: unknown
Country: Netherlands (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.113.85.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.113.85.21.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 07:23:16 CST 2025
;; MSG SIZE  rcvd: 105
        21.85.113.80.in-addr.arpa domain name pointer ip-80-113-85-21.ip.prioritytelecom.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
21.85.113.80.in-addr.arpa	name = ip-80-113-85-21.ip.prioritytelecom.net.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 41.236.106.45 | attackbots | Cluster member 192.168.0.31 (-) said, DENY 41.236.106.45, Reason:[(imapd) Failed IMAP login from 41.236.106.45 (EG/Egypt/host-41.236.106.45.tedata.net): 1 in the last 3600 secs]  | 
                    2019-12-12 18:10:41 | 
| 158.69.195.175 | attackspambots | Dec 12 08:09:12 herz-der-gamer sshd[25126]: Invalid user jl from 158.69.195.175 port 49740 Dec 12 08:09:12 herz-der-gamer sshd[25126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.195.175 Dec 12 08:09:12 herz-der-gamer sshd[25126]: Invalid user jl from 158.69.195.175 port 49740 Dec 12 08:09:14 herz-der-gamer sshd[25126]: Failed password for invalid user jl from 158.69.195.175 port 49740 ssh2 ...  | 
                    2019-12-12 17:58:54 | 
| 222.186.31.127 | attack | Dec 12 10:36:09 root sshd[26996]: Failed password for root from 222.186.31.127 port 34978 ssh2 Dec 12 10:36:15 root sshd[26996]: Failed password for root from 222.186.31.127 port 34978 ssh2 Dec 12 10:36:48 root sshd[27003]: Failed password for root from 222.186.31.127 port 45460 ssh2 ...  | 
                    2019-12-12 17:40:17 | 
| 178.128.221.162 | attack | SSH authentication failure x 6 reported by Fail2Ban ...  | 
                    2019-12-12 17:47:29 | 
| 139.99.40.27 | attackspam | Dec 12 07:56:05 l02a sshd[3502]: Invalid user test from 139.99.40.27 Dec 12 07:56:05 l02a sshd[3502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.40.27 Dec 12 07:56:05 l02a sshd[3502]: Invalid user test from 139.99.40.27 Dec 12 07:56:07 l02a sshd[3502]: Failed password for invalid user test from 139.99.40.27 port 57812 ssh2  | 
                    2019-12-12 17:46:21 | 
| 62.234.152.218 | attack | Dec 12 09:32:12 localhost sshd\[92433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218 user=backup Dec 12 09:32:14 localhost sshd\[92433\]: Failed password for backup from 62.234.152.218 port 35907 ssh2 Dec 12 09:38:22 localhost sshd\[92611\]: Invalid user tau from 62.234.152.218 port 35090 Dec 12 09:38:22 localhost sshd\[92611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.152.218 Dec 12 09:38:24 localhost sshd\[92611\]: Failed password for invalid user tau from 62.234.152.218 port 35090 ssh2 ...  | 
                    2019-12-12 17:57:37 | 
| 36.69.196.87 | attackspam | Unauthorized connection attempt detected from IP address 36.69.196.87 to port 445  | 
                    2019-12-12 18:00:23 | 
| 210.202.8.30 | attack | Dec 12 04:14:41 TORMINT sshd\[20623\]: Invalid user alex from 210.202.8.30 Dec 12 04:14:41 TORMINT sshd\[20623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.202.8.30 Dec 12 04:14:43 TORMINT sshd\[20623\]: Failed password for invalid user alex from 210.202.8.30 port 50644 ssh2 ...  | 
                    2019-12-12 18:06:24 | 
| 116.110.220.28 | attackbotsspam | Dec 12 11:27:43 sauna sshd[223524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.110.220.28 ...  | 
                    2019-12-12 17:34:11 | 
| 175.182.91.104 | attackbotsspam | Dec 12 08:27:56 l02a sshd[5469]: Invalid user fauzi from 175.182.91.104 Dec 12 08:27:56 l02a sshd[5469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.182.91.104 Dec 12 08:27:56 l02a sshd[5469]: Invalid user fauzi from 175.182.91.104 Dec 12 08:27:58 l02a sshd[5469]: Failed password for invalid user fauzi from 175.182.91.104 port 47892 ssh2  | 
                    2019-12-12 17:52:13 | 
| 210.71.232.236 | attackspambots | SSH Brute Force, server-1 sshd[4834]: Failed password for invalid user tchangid from 210.71.232.236 port 33798 ssh2  | 
                    2019-12-12 18:10:24 | 
| 18.253.108.249 | attackbotsspam | 12.12.2019 07:27:29 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter  | 
                    2019-12-12 17:43:35 | 
| 172.110.30.125 | attackbots | <6 unauthorized SSH connections  | 
                    2019-12-12 18:08:42 | 
| 187.188.183.27 | attack | ../../mnt/custom/ProductDefinition  | 
                    2019-12-12 18:06:46 | 
| 119.29.162.17 | attack | Dec 12 09:36:34 lnxweb61 sshd[30844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.162.17  | 
                    2019-12-12 17:35:17 |