City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.1.69.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.1.69.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:16:34 CST 2025
;; MSG SIZE rcvd: 103
29.69.1.85.in-addr.arpa domain name pointer 29.69.1.85.dynamic.cust.swisscom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.69.1.85.in-addr.arpa name = 29.69.1.85.dynamic.cust.swisscom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 153.126.187.46 | attackbots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-06T18:29:28Z and 2020-10-06T18:35:31Z |
2020-10-07 06:55:16 |
| 45.118.34.139 | attackspam | mail auth brute force |
2020-10-07 06:45:39 |
| 45.148.10.15 | attackspambots | $f2bV_matches |
2020-10-07 06:59:10 |
| 192.126.160.218 | attack | Automatic report - Banned IP Access |
2020-10-07 06:58:24 |
| 46.105.149.168 | attackspambots | Oct 7 00:03:30 vpn01 sshd[4781]: Failed password for root from 46.105.149.168 port 60568 ssh2 ... |
2020-10-07 06:49:18 |
| 193.169.253.108 | attackspambots | Brute forcing email accounts |
2020-10-07 06:26:26 |
| 151.236.59.142 | attackspam | TCP port : 4054 |
2020-10-07 06:46:30 |
| 108.188.199.237 | attackspam | Automatic report - Banned IP Access |
2020-10-07 06:34:32 |
| 49.233.130.95 | attack | Oct 6 23:41:42 markkoudstaal sshd[21278]: Failed password for root from 49.233.130.95 port 58396 ssh2 Oct 6 23:45:12 markkoudstaal sshd[22225]: Failed password for root from 49.233.130.95 port 58336 ssh2 ... |
2020-10-07 06:28:12 |
| 45.172.234.137 | attackbotsspam | mail auth brute force |
2020-10-07 06:43:31 |
| 186.170.28.46 | attackspam | Triggered by Fail2Ban at Ares web server |
2020-10-07 06:38:53 |
| 185.188.183.248 | attackbotsspam | Oct 6 20:16:20 haigwepa sshd[5195]: Failed password for root from 185.188.183.248 port 34322 ssh2 ... |
2020-10-07 06:56:48 |
| 109.72.192.78 | attackspambots | Attempted Brute Force (dovecot) |
2020-10-07 06:42:34 |
| 51.254.156.114 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 12183 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-07 06:29:21 |
| 115.91.22.2 | attackspam | 20/10/5@16:42:19: FAIL: Alarm-Network address from=115.91.22.2 ... |
2020-10-07 06:32:37 |