City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.44.18.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.44.18.135.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:47:43 CST 2025
;; MSG SIZE  rcvd: 105
        135.18.44.80.in-addr.arpa domain name pointer host-80-44-18-135.as13285.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
135.18.44.80.in-addr.arpa	name = host-80-44-18-135.as13285.net.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 139.162.121.251 | attackbots | Port scan: Attack repeated for 24 hours  | 
                    2020-01-01 14:08:32 | 
| 189.210.195.104 | attackspambots | Automatic report - Port Scan Attack  | 
                    2020-01-01 14:19:24 | 
| 117.34.72.236 | attackspambots | 117.34.72.236 - - [01/Jan/2020:05:57:03 +0100] "GET /test.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0" 117.34.72.236 - - [01/Jan/2020:05:57:05 +0100] "GET /webdav/ HTTP/1.1" 301 162 "-" "Mozilla/5.0" 117.34.72.236 - - [01/Jan/2020:05:57:05 +0100] "GET /help.php HTTP/1.1" 301 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" ...  | 
                    2020-01-01 13:56:00 | 
| 37.187.54.45 | attack | Dec 31 21:05:58 server sshd\[1496\]: Failed password for invalid user ftpuser from 37.187.54.45 port 55250 ssh2 Jan 1 08:49:46 server sshd\[3607\]: Invalid user server from 37.187.54.45 Jan 1 08:49:46 server sshd\[3607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-37-187-54.eu Jan 1 08:49:48 server sshd\[3607\]: Failed password for invalid user server from 37.187.54.45 port 38754 ssh2 Jan 1 09:03:08 server sshd\[6781\]: Invalid user nathrah from 37.187.54.45 Jan 1 09:03:08 server sshd\[6781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-37-187-54.eu ...  | 
                    2020-01-01 14:17:27 | 
| 222.186.175.217 | attackspambots | 2020-01-01T06:11:11.002115hub.schaetter.us sshd\[317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217 user=root 2020-01-01T06:11:12.928064hub.schaetter.us sshd\[317\]: Failed password for root from 222.186.175.217 port 59084 ssh2 2020-01-01T06:11:15.958245hub.schaetter.us sshd\[317\]: Failed password for root from 222.186.175.217 port 59084 ssh2 2020-01-01T06:11:19.394884hub.schaetter.us sshd\[317\]: Failed password for root from 222.186.175.217 port 59084 ssh2 2020-01-01T06:11:21.911295hub.schaetter.us sshd\[317\]: Failed password for root from 222.186.175.217 port 59084 ssh2 ...  | 
                    2020-01-01 14:12:24 | 
| 113.172.33.194 | attack | smtp probe/invalid login attempt  | 
                    2020-01-01 14:02:24 | 
| 182.43.161.47 | attackspam | Jan 1 07:00:35 localhost sshd\[30109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.43.161.47 user=root Jan 1 07:00:38 localhost sshd\[30109\]: Failed password for root from 182.43.161.47 port 48120 ssh2 Jan 1 07:03:46 localhost sshd\[30526\]: Invalid user an from 182.43.161.47 port 44468 Jan 1 07:03:46 localhost sshd\[30526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.43.161.47  | 
                    2020-01-01 14:25:45 | 
| 186.151.18.213 | attack | Invalid user hoehn from 186.151.18.213 port 38040  | 
                    2020-01-01 14:18:48 | 
| 31.32.224.147 | attackbots | 3x Failed Password  | 
                    2020-01-01 14:46:51 | 
| 54.37.136.213 | attack | Automatic report - Banned IP Access  | 
                    2020-01-01 14:07:37 | 
| 103.195.2.70 | attackspam | Unauthorized access or intrusion attempt detected from Thor banned IP  | 
                    2020-01-01 14:29:31 | 
| 106.12.162.49 | attackspam | Jan 1 06:21:56 markkoudstaal sshd[2290]: Failed password for root from 106.12.162.49 port 48524 ssh2 Jan 1 06:24:24 markkoudstaal sshd[2499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.162.49 Jan 1 06:24:26 markkoudstaal sshd[2499]: Failed password for invalid user lo98ik, from 106.12.162.49 port 40738 ssh2  | 
                    2020-01-01 14:20:19 | 
| 58.220.25.2 | attackspambots | Unauthorized connection attempt detected from IP address 58.220.25.2 to port 1433  | 
                    2020-01-01 14:11:41 | 
| 128.199.106.169 | attackbots | Invalid user dashuan from 128.199.106.169 port 43094  | 
                    2020-01-01 14:05:18 | 
| 117.215.248.150 | attack | 1577854578 - 01/01/2020 05:56:18 Host: 117.215.248.150/117.215.248.150 Port: 445 TCP Blocked  | 
                    2020-01-01 14:18:09 |