City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: Telia
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.230.79.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.230.79.81.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102300 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 23 23:00:21 CST 2025
;; MSG SIZE  rcvd: 10581.79.230.81.in-addr.arpa domain name pointer 81-230-79-81-no600.tbcn.telia.com.
Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
81.79.230.81.in-addr.arpa	name = 81-230-79-81-no600.tbcn.telia.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 110.239.6.239 | attackbots | Brute forcing email accounts | 2020-07-08 22:38:08 | 
| 106.13.164.179 | attackbotsspam | 5x Failed Password | 2020-07-08 22:56:49 | 
| 186.3.12.54 | attackbotsspam | Jul 8 14:57:44 OPSO sshd\[29670\]: Invalid user roger from 186.3.12.54 port 40960 Jul 8 14:57:44 OPSO sshd\[29670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.3.12.54 Jul 8 14:57:46 OPSO sshd\[29670\]: Failed password for invalid user roger from 186.3.12.54 port 40960 ssh2 Jul 8 15:01:17 OPSO sshd\[30216\]: Invalid user katie from 186.3.12.54 port 37756 Jul 8 15:01:17 OPSO sshd\[30216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.3.12.54 | 2020-07-08 22:55:25 | 
| 206.51.29.115 | attackbotsspam | $f2bV_matches | 2020-07-08 22:38:47 | 
| 94.8.176.38 | attack | 2020-07-08T08:46:56.733701mail.thespaminator.com sshd[1445]: Invalid user liangyzh from 94.8.176.38 port 54818 2020-07-08T08:46:59.265350mail.thespaminator.com sshd[1445]: Failed password for invalid user liangyzh from 94.8.176.38 port 54818 ssh2 ... | 2020-07-08 23:00:26 | 
| 60.167.177.15 | attack | Jul 8 09:01:35 george sshd[23368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.177.15 Jul 8 09:01:37 george sshd[23368]: Failed password for invalid user craig from 60.167.177.15 port 60224 ssh2 Jul 8 09:03:42 george sshd[23380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.177.15 | 2020-07-08 22:41:12 | 
| 185.143.72.27 | attackspam | Jul 8 16:46:22 relay postfix/smtpd\[14061\]: warning: unknown\[185.143.72.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 16:46:50 relay postfix/smtpd\[9422\]: warning: unknown\[185.143.72.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 16:47:17 relay postfix/smtpd\[9279\]: warning: unknown\[185.143.72.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 16:47:42 relay postfix/smtpd\[9422\]: warning: unknown\[185.143.72.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 8 16:48:11 relay postfix/smtpd\[12947\]: warning: unknown\[185.143.72.27\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... | 2020-07-08 22:50:18 | 
| 218.208.91.100 | attackbots | 445/tcp 445/tcp [2020-05-10/07-08]2pkt | 2020-07-08 22:30:35 | 
| 162.243.139.167 | attack | [Sun Jun 14 03:12:06 2020] - DDoS Attack From IP: 162.243.139.167 Port: 58412 | 2020-07-08 23:02:06 | 
| 72.221.196.135 | attack | Automatic report - WordPress Brute Force | 2020-07-08 22:49:55 | 
| 106.12.125.241 | attackspam | 2020-07-08T14:51:13.639342upcloud.m0sh1x2.com sshd[19352]: Invalid user iresha from 106.12.125.241 port 54480 | 2020-07-08 23:02:54 | 
| 118.24.48.15 | attackspambots | Lines containing failures of 118.24.48.15 Jul 7 22:04:44 shared09 sshd[6105]: Invalid user ivi from 118.24.48.15 port 35634 Jul 7 22:04:44 shared09 sshd[6105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.48.15 Jul 7 22:04:46 shared09 sshd[6105]: Failed password for invalid user ivi from 118.24.48.15 port 35634 ssh2 Jul 7 22:04:46 shared09 sshd[6105]: Received disconnect from 118.24.48.15 port 35634:11: Bye Bye [preauth] Jul 7 22:04:46 shared09 sshd[6105]: Disconnected from invalid user ivi 118.24.48.15 port 35634 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=118.24.48.15 | 2020-07-08 22:51:12 | 
| 170.80.28.203 | attackspambots | $f2bV_matches | 2020-07-08 23:03:16 | 
| 157.245.154.123 | attack | Lines containing failures of 157.245.154.123 Jul 8 13:38:07 mc sshd[16806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.123 user=r.r Jul 8 13:38:09 mc sshd[16806]: Failed password for r.r from 157.245.154.123 port 35970 ssh2 Jul 8 13:38:11 mc sshd[16806]: Connection closed by authenticating user r.r 157.245.154.123 port 35970 [preauth] Jul 8 13:42:32 mc sshd[16875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.123 user=r.r Jul 8 13:42:34 mc sshd[16875]: Failed password for r.r from 157.245.154.123 port 60856 ssh2 Jul 8 13:42:35 mc sshd[16875]: Connection closed by authenticating user r.r 157.245.154.123 port 60856 [preauth] Jul 8 13:45:46 mc sshd[16934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.123 user=r.r Jul 8 13:45:48 mc sshd[16934]: Failed password for r.r from 157.245.154.123 port 47666 ........ ------------------------------ | 2020-07-08 22:42:19 | 
| 185.63.253.157 | attackbotsspam | Jul 8 16:26:45 sd-69548 sshd[4053130]: Unable to negotiate with 185.63.253.157 port 59896: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Jul 8 16:26:54 sd-69548 sshd[4053141]: Unable to negotiate with 185.63.253.157 port 36554: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... | 2020-07-08 22:41:58 |