City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.1.134.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.1.134.56. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 22:32:37 CST 2025
;; MSG SIZE rcvd: 104
56.134.1.85.in-addr.arpa domain name pointer 56.134.1.85.dynamic.cust.swisscom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
56.134.1.85.in-addr.arpa name = 56.134.1.85.dynamic.cust.swisscom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 118.126.111.108 | attackspam | Aug 16 18:11:28 localhost sshd\[30152\]: Invalid user purple from 118.126.111.108 Aug 16 18:11:28 localhost sshd\[30152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.111.108 Aug 16 18:11:30 localhost sshd\[30152\]: Failed password for invalid user purple from 118.126.111.108 port 40474 ssh2 Aug 16 18:17:47 localhost sshd\[30600\]: Invalid user arthur from 118.126.111.108 Aug 16 18:17:47 localhost sshd\[30600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.111.108 ... |
2019-08-17 00:34:31 |
| 178.149.128.104 | attackbots | Port Scan: TCP/60001 |
2019-08-17 00:03:32 |
| 145.239.212.33 | attack | Port Scan: TCP/65471 |
2019-08-17 00:08:14 |
| 190.57.230.178 | attack | Port Scan: TCP/23 |
2019-08-17 00:00:55 |
| 42.180.84.95 | attack | Port Scan: TCP/23 |
2019-08-16 23:51:47 |
| 97.76.135.58 | attackbotsspam | Port Scan: UDP/137 |
2019-08-16 23:44:57 |
| 60.249.150.141 | attack | scan z |
2019-08-17 00:21:39 |
| 223.199.155.40 | attack | Port Scan: TCP/21 |
2019-08-16 23:29:51 |
| 50.205.152.114 | attackspam | Port Scan: UDP/137 |
2019-08-16 23:48:57 |
| 188.166.150.79 | attack | Aug 16 19:13:55 yabzik sshd[10097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.79 Aug 16 19:13:57 yabzik sshd[10097]: Failed password for invalid user user from 188.166.150.79 port 59514 ssh2 Aug 16 19:18:01 yabzik sshd[11726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.79 |
2019-08-17 00:20:59 |
| 152.174.32.102 | attackbotsspam | Port Scan: TCP/8080 |
2019-08-16 23:39:31 |
| 171.120.145.148 | attackbotsspam | Port Scan: TCP/8080 |
2019-08-17 00:05:10 |
| 45.254.254.128 | attack | Port Scan: TCP/5555 |
2019-08-16 23:50:39 |
| 208.102.56.239 | attack | Port Scan: TCP/445 |
2019-08-16 23:32:54 |
| 86.159.95.221 | attackbots | Aug 16 18:17:57 vserver sshd\[26410\]: Invalid user pi from 86.159.95.221Aug 16 18:17:58 vserver sshd\[26412\]: Invalid user pi from 86.159.95.221Aug 16 18:17:59 vserver sshd\[26410\]: Failed password for invalid user pi from 86.159.95.221 port 47546 ssh2Aug 16 18:18:00 vserver sshd\[26412\]: Failed password for invalid user pi from 86.159.95.221 port 47548 ssh2 ... |
2019-08-17 00:22:10 |