City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.170.134.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35450
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.170.134.212. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 16:27:30 CST 2025
;; MSG SIZE rcvd: 107
212.134.170.81.in-addr.arpa domain name pointer h-81-170-134-212.A2212.priv.bahnhof.se.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
212.134.170.81.in-addr.arpa name = h-81-170-134-212.A2212.priv.bahnhof.se.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 159.65.144.36 | attackbotsspam | Mar 31 19:42:36 |
2020-04-01 04:22:39 |
| 80.211.171.78 | attack | Mar 31 14:28:09 debian-2gb-nbg1-2 kernel: \[7916742.082213\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.211.171.78 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x00 TTL=240 ID=30783 PROTO=TCP SPT=45117 DPT=7913 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-01 04:04:13 |
| 5.39.88.60 | attackbots | 20 attempts against mh-ssh on cloud |
2020-04-01 04:22:21 |
| 159.89.99.68 | attackspambots | Unauthorized connection attempt detected, IP banned. |
2020-04-01 04:15:01 |
| 195.231.3.146 | attack | Mar 31 21:05:56 mail.srvfarm.net postfix/smtpd[740123]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 31 21:05:56 mail.srvfarm.net postfix/smtpd[740123]: lost connection after AUTH from unknown[195.231.3.146] Mar 31 21:10:42 mail.srvfarm.net postfix/smtpd[740062]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 31 21:10:42 mail.srvfarm.net postfix/smtpd[740062]: lost connection after AUTH from unknown[195.231.3.146] Mar 31 21:10:47 mail.srvfarm.net postfix/smtpd[740123]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 31 21:10:47 mail.srvfarm.net postfix/smtpd[740123]: lost connection after AUTH from unknown[195.231.3.146] |
2020-04-01 04:18:55 |
| 156.221.108.30 | attackbots | DATE:2020-03-31 14:23:49, IP:156.221.108.30, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-04-01 04:11:28 |
| 89.16.103.241 | attackbots | Mar 31 14:21:59 mail.srvfarm.net postfix/smtpd[598933]: NOQUEUE: reject: RCPT from unknown[89.16.103.241]: 554 5.7.1 Service unavailable; Client host [89.16.103.241] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?89.16.103.241; from= |
2020-04-01 04:18:00 |
| 201.110.209.9 | attack | Honeypot attack, port: 445, PTR: dsl-201-110-209-9-dyn.prod-infinitum.com.mx. |
2020-04-01 04:08:52 |
| 208.71.172.46 | attackspambots | SSH Brute-Force attacks |
2020-04-01 04:29:59 |
| 171.235.111.224 | attackbots | Automatic report - Port Scan Attack |
2020-04-01 04:24:12 |
| 182.61.21.155 | attackspam | Mar 31 22:07:41 vpn01 sshd[8439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.21.155 Mar 31 22:07:43 vpn01 sshd[8439]: Failed password for invalid user add from 182.61.21.155 port 42306 ssh2 ... |
2020-04-01 04:35:29 |
| 49.235.169.101 | attackbotsspam | Mar 31 21:22:26 mail sshd[11465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.169.101 user=root Mar 31 21:22:27 mail sshd[11465]: Failed password for root from 49.235.169.101 port 57218 ssh2 Mar 31 21:25:04 mail sshd[15084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.169.101 user=root Mar 31 21:25:06 mail sshd[15084]: Failed password for root from 49.235.169.101 port 56454 ssh2 Mar 31 21:26:51 mail sshd[18356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.169.101 user=root Mar 31 21:26:54 mail sshd[18356]: Failed password for root from 49.235.169.101 port 45800 ssh2 ... |
2020-04-01 04:35:42 |
| 223.15.36.57 | attackspambots | 1585657696 - 03/31/2020 14:28:16 Host: 223.15.36.57/223.15.36.57 Port: 23 TCP Blocked |
2020-04-01 03:58:57 |
| 109.254.254.3 | attackspam | Honeypot attack, port: 445, PTR: ip-109-254-254-3.dec.net.ua. |
2020-04-01 04:37:06 |
| 63.250.32.78 | attackspambots | Brute force SIP Registration |
2020-04-01 04:07:52 |