City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.193.251.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.193.251.85.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 23:55:15 CST 2025
;; MSG SIZE  rcvd: 106
        85.251.193.81.in-addr.arpa domain name pointer static-b4-251-85.telepac.pt.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
85.251.193.81.in-addr.arpa	name = static-b4-251-85.telepac.pt.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 223.204.251.200 | attackspam | Honeypot attack, port: 445, PTR: mx-ll-223.204.251-200.dynamic.3bb.co.th.  | 
                    2020-05-05 21:57:56 | 
| 198.108.66.201 | attackbots | " "  | 
                    2020-05-05 22:32:24 | 
| 112.104.10.189 | attack | 1588670202 - 05/05/2020 11:16:42 Host: 112.104.10.189/112.104.10.189 Port: 445 TCP Blocked  | 
                    2020-05-05 22:15:33 | 
| 51.75.140.153 | attack | 2020-05-05T11:49:28.106445upcloud.m0sh1x2.com sshd[1197]: Invalid user selma from 51.75.140.153 port 55566  | 
                    2020-05-05 22:19:38 | 
| 120.31.138.82 | attackbots | Brute-force attempt banned  | 
                    2020-05-05 21:55:42 | 
| 113.125.21.66 | attack | May 5 11:11:49 vmd17057 sshd[11341]: Failed password for root from 113.125.21.66 port 36644 ssh2 May 5 11:16:44 vmd17057 sshd[11615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.21.66 ...  | 
                    2020-05-05 22:34:39 | 
| 88.218.17.136 | attack | [portscan] tcp/3389 [MS RDP] *(RWIN=1024)(05051113)  | 
                    2020-05-05 22:40:17 | 
| 185.50.149.25 | attackbotsspam | 2020-05-05 16:15:47 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data \(set_id=giorgio@opso.it\) 2020-05-05 16:15:54 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data 2020-05-05 16:16:03 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data 2020-05-05 16:16:09 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data 2020-05-05 16:16:23 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data  | 
                    2020-05-05 22:22:06 | 
| 49.156.32.41 | attack | SMB Server BruteForce Attack  | 
                    2020-05-05 22:16:21 | 
| 150.136.57.188 | attackbotsspam | May 5 15:52:56 vmd17057 sshd[27735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.57.188 May 5 15:52:57 vmd17057 sshd[27735]: Failed password for invalid user jenkins from 150.136.57.188 port 38152 ssh2 ...  | 
                    2020-05-05 21:54:41 | 
| 113.200.160.138 | attackbots | SSH/22 MH Probe, BF, Hack -  | 
                    2020-05-05 22:09:21 | 
| 46.17.107.81 | attackspambots | SMB Server BruteForce Attack  | 
                    2020-05-05 22:31:59 | 
| 167.114.96.156 | attackspam | Fail2Ban Ban Triggered  | 
                    2020-05-05 22:11:31 | 
| 14.161.22.159 | attackspam | 1588670200 - 05/05/2020 11:16:40 Host: 14.161.22.159/14.161.22.159 Port: 445 TCP Blocked  | 
                    2020-05-05 22:16:46 | 
| 115.72.232.58 | attackbots | 20/5/5@06:17:00: FAIL: Alarm-Network address from=115.72.232.58 ...  | 
                    2020-05-05 22:03:43 |