City: unknown
Region: unknown
Country: Denmark
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.129.18.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.129.18.22. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 17:29:10 CST 2025
;; MSG SIZE rcvd: 105
22.18.129.85.in-addr.arpa domain name pointer hdxda3.dsl.tele.dk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
22.18.129.85.in-addr.arpa name = hdxda3.dsl.tele.dk.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 61.153.213.210 | attackbotsspam | 11/24/2019-17:55:47.580503 61.153.213.210 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-11-25 09:07:05 |
| 59.152.196.154 | attackspambots | Nov 25 01:02:31 vpn01 sshd[30966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.196.154 Nov 25 01:02:33 vpn01 sshd[30966]: Failed password for invalid user server from 59.152.196.154 port 56605 ssh2 ... |
2019-11-25 09:02:00 |
| 222.186.190.92 | attackspambots | Nov 25 01:29:34 srv206 sshd[4962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92 user=root Nov 25 01:29:36 srv206 sshd[4962]: Failed password for root from 222.186.190.92 port 40580 ssh2 ... |
2019-11-25 08:46:09 |
| 118.24.143.233 | attackbotsspam | Nov 24 21:00:48 firewall sshd[4543]: Invalid user raynaldo from 118.24.143.233 Nov 24 21:00:49 firewall sshd[4543]: Failed password for invalid user raynaldo from 118.24.143.233 port 50403 ssh2 Nov 24 21:08:11 firewall sshd[4677]: Invalid user operator from 118.24.143.233 ... |
2019-11-25 08:47:10 |
| 152.136.72.17 | attack | Nov 25 02:14:10 server sshd\[29452\]: Invalid user wease from 152.136.72.17 Nov 25 02:14:10 server sshd\[29452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.72.17 Nov 25 02:14:11 server sshd\[29452\]: Failed password for invalid user wease from 152.136.72.17 port 37914 ssh2 Nov 25 02:40:36 server sshd\[3661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.72.17 user=root Nov 25 02:40:38 server sshd\[3661\]: Failed password for root from 152.136.72.17 port 38396 ssh2 ... |
2019-11-25 08:40:39 |
| 148.70.246.130 | attackspambots | Nov 25 01:38:40 meumeu sshd[10469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.246.130 Nov 25 01:38:42 meumeu sshd[10469]: Failed password for invalid user password from 148.70.246.130 port 33924 ssh2 Nov 25 01:46:11 meumeu sshd[11715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.246.130 ... |
2019-11-25 09:04:25 |
| 89.248.169.17 | attack | Honeypot attack, port: 5555, PTR: PTR record not found |
2019-11-25 09:11:25 |
| 51.91.101.222 | attackbots | Nov 25 05:14:08 gw1 sshd[29415]: Failed password for root from 51.91.101.222 port 59014 ssh2 ... |
2019-11-25 08:50:13 |
| 92.53.90.84 | attackbots | Connection by 92.53.90.84 on port: 15000 got caught by honeypot at 11/24/2019 11:49:18 PM |
2019-11-25 08:57:09 |
| 27.72.102.190 | attackbots | Nov 25 00:52:05 markkoudstaal sshd[22710]: Failed password for root from 27.72.102.190 port 33440 ssh2 Nov 25 01:00:04 markkoudstaal sshd[23399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.102.190 Nov 25 01:00:07 markkoudstaal sshd[23399]: Failed password for invalid user deployer from 27.72.102.190 port 30311 ssh2 |
2019-11-25 08:34:15 |
| 106.12.177.51 | attackspambots | Nov 25 01:27:22 root sshd[8784]: Failed password for root from 106.12.177.51 port 57086 ssh2 Nov 25 01:31:04 root sshd[8827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.177.51 Nov 25 01:31:06 root sshd[8827]: Failed password for invalid user reuven from 106.12.177.51 port 60074 ssh2 ... |
2019-11-25 08:33:39 |
| 52.219.0.109 | attackspam | 52.219.0.109 was recorded 5 times by 1 hosts attempting to connect to the following ports: 20710. Incident counter (4h, 24h, all-time): 5, 13, 13 |
2019-11-25 08:59:19 |
| 51.254.114.105 | attackspambots | Invalid user huo from 51.254.114.105 port 34057 |
2019-11-25 08:43:11 |
| 223.71.167.155 | attackspam | Multiport scan : 5 ports scanned 13 873 1194 1962 41795 |
2019-11-25 08:33:12 |
| 192.99.86.53 | attackspam | 192.99.86.53 was recorded 8 times by 2 hosts attempting to connect to the following ports: 1433. Incident counter (4h, 24h, all-time): 8, 59, 346 |
2019-11-25 08:53:01 |