City: unknown
Region: unknown
Country: Hungary
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.99.70.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.99.70.211. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 04:30:10 CST 2025
;; MSG SIZE rcvd: 105
211.70.99.80.in-addr.arpa domain name pointer catv-80-99-70-211.catv.fixed.one.hu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
211.70.99.80.in-addr.arpa name = catv-80-99-70-211.catv.fixed.one.hu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 31.184.215.239 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 15 - port: 15386 proto: TCP cat: Misc Attack |
2019-11-08 00:10:15 |
| 45.143.220.55 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-08 00:07:48 |
| 185.254.120.15 | attackspam | Connection by 185.254.120.15 on port: 9926 got caught by honeypot at 11/7/2019 1:47:46 PM |
2019-11-08 00:02:26 |
| 195.250.96.29 | attackbotsspam | SSH/22 MH Probe, BF, Hack - |
2019-11-08 00:11:07 |
| 191.31.104.36 | attack | Lines containing failures of 191.31.104.36 Nov 7 15:42:08 omfg postfix/smtpd[28948]: connect from unknown[191.31.104.36] Nov x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=191.31.104.36 |
2019-11-07 23:53:48 |
| 174.138.19.114 | attackbotsspam | Nov 7 22:20:19 webhost01 sshd[6262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.19.114 Nov 7 22:20:21 webhost01 sshd[6262]: Failed password for invalid user cbs from 174.138.19.114 port 46810 ssh2 ... |
2019-11-07 23:49:54 |
| 140.114.91.94 | attackspambots | F2B jail: sshd. Time: 2019-11-07 16:57:57, Reported by: VKReport |
2019-11-08 00:14:20 |
| 212.216.126.148 | attackbots | Nov 6 05:28:35 cumulus sshd[27277]: Invalid user pi from 212.216.126.148 port 46440 Nov 6 05:28:35 cumulus sshd[27278]: Invalid user pi from 212.216.126.148 port 46446 Nov 6 05:28:35 cumulus sshd[27277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.216.126.148 Nov 6 05:28:35 cumulus sshd[27278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.216.126.148 Nov 6 05:28:37 cumulus sshd[27277]: Failed password for invalid user pi from 212.216.126.148 port 46440 ssh2 Nov 6 05:28:37 cumulus sshd[27278]: Failed password for invalid user pi from 212.216.126.148 port 46446 ssh2 Nov 6 05:28:37 cumulus sshd[27277]: Connection closed by 212.216.126.148 port 46440 [preauth] Nov 6 05:28:38 cumulus sshd[27278]: Connection closed by 212.216.126.148 port 46446 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=212.216.126.148 |
2019-11-08 00:18:31 |
| 192.81.215.176 | attackbotsspam | $f2bV_matches |
2019-11-08 00:15:34 |
| 189.94.123.39 | attack | SSH/22 MH Probe, BF, Hack - |
2019-11-08 00:16:11 |
| 80.241.211.237 | attackspambots | 11/07/2019-10:49:37.645548 80.241.211.237 Protocol: 6 ET SCAN Potential SSH Scan |
2019-11-07 23:50:39 |
| 185.211.245.198 | attackbotsspam | Nov 7 16:24:22 mail postfix/smtpd[25425]: warning: unknown[185.211.245.198]: SASL PLAIN authentication failed: Nov 7 16:29:15 mail postfix/smtpd[26155]: warning: unknown[185.211.245.198]: SASL PLAIN authentication failed: Nov 7 16:29:44 mail postfix/smtpd[26633]: warning: unknown[185.211.245.198]: SASL PLAIN authentication failed: |
2019-11-07 23:49:13 |
| 129.204.130.77 | attackspambots | Nov 5 23:44:03 host2 sshd[11298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.130.77 user=r.r Nov 5 23:44:04 host2 sshd[11298]: Failed password for r.r from 129.204.130.77 port 36500 ssh2 Nov 5 23:44:05 host2 sshd[11298]: Received disconnect from 129.204.130.77: 11: Bye Bye [preauth] Nov 5 23:52:46 host2 sshd[9564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.130.77 user=r.r Nov 5 23:52:48 host2 sshd[9564]: Failed password for r.r from 129.204.130.77 port 37143 ssh2 Nov 5 23:52:48 host2 sshd[9564]: Received disconnect from 129.204.130.77: 11: Bye Bye [preauth] Nov 5 23:57:46 host2 sshd[26531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.130.77 user=r.r Nov 5 23:57:48 host2 sshd[26531]: Failed password for r.r from 129.204.130.77 port 56430 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=12 |
2019-11-08 00:00:52 |
| 185.175.93.21 | attack | 11/07/2019-15:48:04.865818 185.175.93.21 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-07 23:43:13 |
| 182.148.100.11 | attackspambots | Nov 6 06:59:42 h2040555 sshd[4136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.100.11 user=r.r Nov 6 06:59:44 h2040555 sshd[4136]: Failed password for r.r from 182.148.100.11 port 57008 ssh2 Nov 6 06:59:44 h2040555 sshd[4136]: Received disconnect from 182.148.100.11: 11: Bye Bye [preauth] Nov 6 07:15:17 h2040555 sshd[4346]: Invalid user ha from 182.148.100.11 Nov 6 07:15:17 h2040555 sshd[4346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.100.11 Nov 6 07:15:19 h2040555 sshd[4346]: Failed password for invalid user ha from 182.148.100.11 port 47089 ssh2 Nov 6 07:15:19 h2040555 sshd[4346]: Received disconnect from 182.148.100.11: 11: Bye Bye [preauth] Nov 6 07:22:12 h2040555 sshd[4428]: Invalid user winrar from 182.148.100.11 Nov 6 07:22:12 h2040555 sshd[4428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.100......... ------------------------------- |
2019-11-07 23:49:40 |