City: unknown
Region: unknown
Country: Hungary
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.98.54.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.98.54.199.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400
;; Query time: 250 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 03:22:52 CST 2025
;; MSG SIZE  rcvd: 105
        199.54.98.80.in-addr.arpa domain name pointer catv-80-98-54-199.catv.fixed.one.hu.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
199.54.98.80.in-addr.arpa	name = catv-80-98-54-199.catv.fixed.one.hu.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 13.56.150.241 | attackbots | Unauthorized connection attempt detected, IP banned.  | 
                    2020-02-01 13:32:29 | 
| 52.66.31.102 | attack | Unauthorized connection attempt detected from IP address 52.66.31.102 to port 2220 [J]  | 
                    2020-02-01 13:29:25 | 
| 79.155.152.225 | attackbotsspam | Port 22 Scan, PTR: None  | 
                    2020-02-01 13:54:32 | 
| 190.85.171.126 | attack | Port 22 Scan, PTR: None  | 
                    2020-02-01 13:41:34 | 
| 78.246.35.3 | attackbots | Feb 1 01:54:17 firewall sshd[26994]: Invalid user vnc from 78.246.35.3 Feb 1 01:54:19 firewall sshd[26994]: Failed password for invalid user vnc from 78.246.35.3 port 56884 ssh2 Feb 1 01:57:39 firewall sshd[27111]: Invalid user usuario from 78.246.35.3 ...  | 
                    2020-02-01 13:57:04 | 
| 212.183.227.162 | attackbots | Unauthorized connection attempt detected from IP address 212.183.227.162 to port 2220 [J]  | 
                    2020-02-01 14:04:47 | 
| 122.51.86.120 | attackspam | Unauthorized connection attempt detected from IP address 122.51.86.120 to port 2220 [J]  | 
                    2020-02-01 13:37:41 | 
| 103.100.209.210 | attackspam | Feb 1 05:57:35 MK-Soft-VM8 sshd[13682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.210 Feb 1 05:57:37 MK-Soft-VM8 sshd[13682]: Failed password for invalid user admin from 103.100.209.210 port 33510 ssh2 ...  | 
                    2020-02-01 13:58:57 | 
| 159.89.169.137 | attackbots | Jan 31 19:11:11 hpm sshd\[8766\]: Invalid user nagios from 159.89.169.137 Jan 31 19:11:11 hpm sshd\[8766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137 Jan 31 19:11:13 hpm sshd\[8766\]: Failed password for invalid user nagios from 159.89.169.137 port 47988 ssh2 Jan 31 19:14:29 hpm sshd\[9676\]: Invalid user tom from 159.89.169.137 Jan 31 19:14:29 hpm sshd\[9676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.137  | 
                    2020-02-01 13:31:04 | 
| 180.124.4.37 | attack | Feb 1 05:58:07 grey postfix/smtpd\[15061\]: NOQUEUE: reject: RCPT from unknown\[180.124.4.37\]: 554 5.7.1 Service unavailable\; Client host \[180.124.4.37\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[180.124.4.37\]\; from=\  | 
                    2020-02-01 13:35:27 | 
| 159.65.62.216 | attackbotsspam | Feb 1 05:53:09 srv-ubuntu-dev3 sshd[127704]: Invalid user user from 159.65.62.216 Feb 1 05:53:09 srv-ubuntu-dev3 sshd[127704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.62.216 Feb 1 05:53:09 srv-ubuntu-dev3 sshd[127704]: Invalid user user from 159.65.62.216 Feb 1 05:53:11 srv-ubuntu-dev3 sshd[127704]: Failed password for invalid user user from 159.65.62.216 port 57982 ssh2 Feb 1 05:55:41 srv-ubuntu-dev3 sshd[127984]: Invalid user cloud from 159.65.62.216 Feb 1 05:55:41 srv-ubuntu-dev3 sshd[127984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.62.216 Feb 1 05:55:41 srv-ubuntu-dev3 sshd[127984]: Invalid user cloud from 159.65.62.216 Feb 1 05:55:43 srv-ubuntu-dev3 sshd[127984]: Failed password for invalid user cloud from 159.65.62.216 port 59296 ssh2 Feb 1 05:58:20 srv-ubuntu-dev3 sshd[128181]: Invalid user vboxuser from 159.65.62.216 ...  | 
                    2020-02-01 13:23:22 | 
| 114.234.157.245 | attack | GPON Home Routers Remote Code Execution Vulnerability CVE 2018-10562, PTR: 245.157.234.114.broad.xz.js.dynamic.163data.com.cn.  | 
                    2020-02-01 13:25:37 | 
| 49.88.112.62 | attack | Feb 1 07:01:40 srv206 sshd[3669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.62 user=root Feb 1 07:01:42 srv206 sshd[3669]: Failed password for root from 49.88.112.62 port 58897 ssh2 ...  | 
                    2020-02-01 14:04:16 | 
| 112.158.118.159 | attack | Feb 1 00:14:50 plusreed sshd[6170]: Invalid user dspacedspace from 112.158.118.159 ...  | 
                    2020-02-01 13:45:41 | 
| 27.254.137.144 | attackbots | Unauthorized connection attempt detected from IP address 27.254.137.144 to port 2220 [J]  | 
                    2020-02-01 14:06:05 |