City: Kerzers
Region: Fribourg
Country: Switzerland
Internet Service Provider: Swisscom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.2.140.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30064
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.2.140.43. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:39:50 CST 2025
;; MSG SIZE rcvd: 104
43.140.2.85.in-addr.arpa domain name pointer 43.140.2.85.dynamic.cust.swisscom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
43.140.2.85.in-addr.arpa name = 43.140.2.85.dynamic.cust.swisscom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 220.243.178.128 | attack | SSH/22 MH Probe, BF, Hack - |
2019-11-02 01:07:43 |
| 185.234.217.88 | attack | Looking for ".env" ? GET /.env |
2019-11-02 01:17:36 |
| 193.32.163.182 | attackspam | Nov 1 13:07:50 XXX sshd[11446]: Invalid user admin from 193.32.163.182 port 50004 |
2019-11-02 01:21:45 |
| 94.230.140.134 | attackspambots | SMB Server BruteForce Attack |
2019-11-02 01:10:25 |
| 222.186.173.180 | attackspambots | Nov 1 07:19:42 eddieflores sshd\[17183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root Nov 1 07:19:44 eddieflores sshd\[17183\]: Failed password for root from 222.186.173.180 port 4194 ssh2 Nov 1 07:20:09 eddieflores sshd\[17218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root Nov 1 07:20:11 eddieflores sshd\[17218\]: Failed password for root from 222.186.173.180 port 60838 ssh2 Nov 1 07:20:40 eddieflores sshd\[17256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root |
2019-11-02 01:23:13 |
| 187.162.31.112 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-02 01:23:33 |
| 181.118.174.168 | attackspam | Unauthorized connection attempt from IP address 181.118.174.168 on Port 445(SMB) |
2019-11-02 01:42:07 |
| 120.52.121.86 | attackspam | SSH bruteforce |
2019-11-02 01:17:15 |
| 87.11.244.194 | attackbotsspam | SSH/22 MH Probe, BF, Hack - |
2019-11-02 01:36:10 |
| 90.102.193.193 | attack | Unauthorized connection attempt from IP address 90.102.193.193 on Port 445(SMB) |
2019-11-02 01:41:39 |
| 222.186.175.154 | attack | Nov 1 14:27:46 firewall sshd[4216]: Failed password for root from 222.186.175.154 port 27786 ssh2 Nov 1 14:28:03 firewall sshd[4216]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 27786 ssh2 [preauth] Nov 1 14:28:03 firewall sshd[4216]: Disconnecting: Too many authentication failures [preauth] ... |
2019-11-02 01:31:31 |
| 115.72.95.68 | attackspambots | Unauthorized connection attempt from IP address 115.72.95.68 on Port 445(SMB) |
2019-11-02 01:49:33 |
| 54.39.187.138 | attackbotsspam | Nov 1 07:30:11 web1 sshd\[20411\]: Invalid user bao from 54.39.187.138 Nov 1 07:30:11 web1 sshd\[20411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.187.138 Nov 1 07:30:13 web1 sshd\[20411\]: Failed password for invalid user bao from 54.39.187.138 port 39981 ssh2 Nov 1 07:33:40 web1 sshd\[20750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.187.138 user=root Nov 1 07:33:42 web1 sshd\[20750\]: Failed password for root from 54.39.187.138 port 59457 ssh2 |
2019-11-02 01:36:59 |
| 188.153.114.151 | attack | Port scan on 2 port(s): 84 9200 |
2019-11-02 01:03:23 |
| 173.220.206.162 | attackbots | Nov 1 14:12:34 XXX sshd[56383]: Invalid user pi from 173.220.206.162 port 27062 |
2019-11-02 01:06:07 |