City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.180.83.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.180.83.44. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 15:50:19 CST 2025
;; MSG SIZE rcvd: 105
44.83.180.85.in-addr.arpa domain name pointer dynamic-085-180-083-044.85.180.pool.telefonica.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
44.83.180.85.in-addr.arpa name = dynamic-085-180-083-044.85.180.pool.telefonica.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.100.74.4 | attackbotsspam | Unauthorized connection attempt detected from IP address 180.100.74.4 to port 3389 [T] |
2020-03-24 18:50:16 |
| 93.179.93.54 | attackbotsspam | Unauthorized connection attempt detected from IP address 93.179.93.54 to port 445 [T] |
2020-03-24 18:30:14 |
| 116.113.99.171 | attackbotsspam | Unauthorized connection attempt detected from IP address 116.113.99.171 to port 5555 [T] |
2020-03-24 18:24:57 |
| 180.116.99.206 | attackspam | Unauthorized connection attempt detected from IP address 180.116.99.206 to port 23 [T] |
2020-03-24 18:15:45 |
| 119.202.72.62 | attackbots | Unauthorized connection attempt detected from IP address 119.202.72.62 to port 23 [T] |
2020-03-24 18:23:11 |
| 106.12.193.96 | attackspam | Mar 24 10:12:06 sd-53420 sshd\[11629\]: Invalid user nz from 106.12.193.96 Mar 24 10:12:06 sd-53420 sshd\[11629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.96 Mar 24 10:12:08 sd-53420 sshd\[11629\]: Failed password for invalid user nz from 106.12.193.96 port 36400 ssh2 Mar 24 10:15:09 sd-53420 sshd\[12618\]: Invalid user enquiries from 106.12.193.96 Mar 24 10:15:09 sd-53420 sshd\[12618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.96 ... |
2020-03-24 18:28:24 |
| 223.79.169.167 | attackbots | Unauthorized connection attempt detected from IP address 223.79.169.167 to port 23 [T] |
2020-03-24 18:10:22 |
| 42.119.215.192 | attackbotsspam | Unauthorized connection attempt detected from IP address 42.119.215.192 to port 9530 [T] |
2020-03-24 18:35:42 |
| 80.73.73.107 | attack | Unauthorized connection attempt detected from IP address 80.73.73.107 to port 445 [T] |
2020-03-24 18:31:57 |
| 1.69.235.131 | attackspam | Unauthorized connection attempt detected from IP address 1.69.235.131 to port 23 [T] |
2020-03-24 18:39:10 |
| 14.6.101.76 | attackbotsspam | Unauthorized connection attempt detected from IP address 14.6.101.76 to port 2222 [T] |
2020-03-24 18:38:29 |
| 223.240.88.127 | attackbots | Unauthorized connection attempt detected from IP address 223.240.88.127 to port 6379 [T] |
2020-03-24 18:08:03 |
| 121.121.113.33 | attackspambots | Unauthorized connection attempt detected from IP address 121.121.113.33 to port 81 [T] |
2020-03-24 18:22:18 |
| 164.68.112.178 | attack | SIP/5060 Probe, BF, Hack - |
2020-03-24 18:50:47 |
| 180.122.13.216 | attack | Unauthorized connection attempt detected from IP address 180.122.13.216 to port 23 [T] |
2020-03-24 18:15:21 |