City: Groningen
Region: Groningen
Country: The Netherlands
Internet Service Provider: Vodafone
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.147.3.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.147.3.89. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:50:11 CST 2025
;; MSG SIZE rcvd: 104
89.3.147.85.in-addr.arpa domain name pointer 85-147-3-89.cable.dynamic.v4.ziggo.nl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
89.3.147.85.in-addr.arpa name = 85-147-3-89.cable.dynamic.v4.ziggo.nl.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.116.11.86 | attackspambots | Port probing on unauthorized port 4567 |
2020-02-14 15:55:16 |
| 119.56.222.52 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-14 15:53:15 |
| 217.24.18.108 | attack | mail.imlek.co.rs (mail.imlek.co.rs [217.24.18.108]) |
2020-02-14 15:36:17 |
| 59.102.253.191 | attack | Feb 14 06:12:08 ms-srv sshd[19843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.102.253.191 |
2020-02-14 15:37:25 |
| 123.207.144.186 | attackbots | Invalid user git from 123.207.144.186 port 51528 |
2020-02-14 16:08:15 |
| 119.6.171.97 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-14 15:44:34 |
| 103.48.192.48 | attackbotsspam | Automatic report - SSH Brute-Force Attack |
2020-02-14 16:06:53 |
| 51.68.47.44 | attackbotsspam | Feb 14 07:30:43 l02a sshd[28275]: Invalid user motion from 51.68.47.44 Feb 14 07:30:43 l02a sshd[28275]: Invalid user motion from 51.68.47.44 Feb 14 07:30:45 l02a sshd[28275]: Failed password for invalid user motion from 51.68.47.44 port 50786 ssh2 |
2020-02-14 16:12:15 |
| 45.233.10.169 | attackbots | Automatic report - Port Scan Attack |
2020-02-14 16:02:32 |
| 62.112.109.146 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-14 16:21:19 |
| 5.198.177.139 | attack | Automatic report - Port Scan Attack |
2020-02-14 15:39:49 |
| 142.93.212.131 | attackspambots | Feb 14 07:47:51 server sshd\[18559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.131 user=root Feb 14 07:47:53 server sshd\[18559\]: Failed password for root from 142.93.212.131 port 43070 ssh2 Feb 14 07:54:38 server sshd\[19426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.131 user=root Feb 14 07:54:40 server sshd\[19426\]: Failed password for root from 142.93.212.131 port 39034 ssh2 Feb 14 07:55:37 server sshd\[19916\]: Invalid user cstrike from 142.93.212.131 ... |
2020-02-14 16:09:26 |
| 138.68.99.46 | attackbotsspam | Feb 14 05:01:42 ns382633 sshd\[11747\]: Invalid user er from 138.68.99.46 port 53194 Feb 14 05:01:42 ns382633 sshd\[11747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.99.46 Feb 14 05:01:44 ns382633 sshd\[11747\]: Failed password for invalid user er from 138.68.99.46 port 53194 ssh2 Feb 14 05:56:15 ns382633 sshd\[20658\]: Invalid user avdcodel from 138.68.99.46 port 55976 Feb 14 05:56:15 ns382633 sshd\[20658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.99.46 |
2020-02-14 15:36:31 |
| 125.25.90.103 | attackbotsspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-02-14 15:46:23 |
| 119.49.72.139 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-14 16:17:59 |