City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.2.231.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.2.231.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 19:38:22 CST 2025
;; MSG SIZE rcvd: 104
42.231.2.85.in-addr.arpa domain name pointer 42.231.2.85.dynamic.cust.swisscom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.231.2.85.in-addr.arpa name = 42.231.2.85.dynamic.cust.swisscom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 194.78.58.50 | attackspambots | Unauthorized connection attempt from IP address 194.78.58.50 on Port 445(SMB) |
2020-04-20 05:22:14 |
| 222.186.30.57 | attackspam | Apr 19 21:39:57 localhost sshd[98173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57 user=root Apr 19 21:39:59 localhost sshd[98173]: Failed password for root from 222.186.30.57 port 55443 ssh2 Apr 19 21:40:01 localhost sshd[98173]: Failed password for root from 222.186.30.57 port 55443 ssh2 Apr 19 21:39:57 localhost sshd[98173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57 user=root Apr 19 21:39:59 localhost sshd[98173]: Failed password for root from 222.186.30.57 port 55443 ssh2 Apr 19 21:40:01 localhost sshd[98173]: Failed password for root from 222.186.30.57 port 55443 ssh2 Apr 19 21:39:57 localhost sshd[98173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57 user=root Apr 19 21:39:59 localhost sshd[98173]: Failed password for root from 222.186.30.57 port 55443 ssh2 Apr 19 21:40:01 localhost sshd[98173]: Failed pas ... |
2020-04-20 05:43:47 |
| 179.127.198.156 | attackspam | Unauthorized connection attempt from IP address 179.127.198.156 on Port 445(SMB) |
2020-04-20 05:14:53 |
| 177.32.24.182 | attackspambots | WordPress brute force |
2020-04-20 05:41:49 |
| 161.35.36.80 | attackbots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-04-20 05:05:10 |
| 194.116.228.252 | attack | SpamScore above: 10.0 |
2020-04-20 05:31:56 |
| 142.93.109.153 | attackspambots | Automatic report - Port Scan |
2020-04-20 05:35:43 |
| 177.43.30.63 | attackbotsspam | SSHD brute force attack detected by fail2ban |
2020-04-20 05:29:49 |
| 13.75.46.224 | attack | SSH Brute-Force Attack |
2020-04-20 05:11:19 |
| 106.12.195.99 | attackspambots | Apr 19 20:15:14 *** sshd[13717]: Invalid user tester from 106.12.195.99 |
2020-04-20 05:23:21 |
| 68.71.22.10 | attackspam | Apr 19 22:46:58 vpn01 sshd[7380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.71.22.10 Apr 19 22:47:00 vpn01 sshd[7380]: Failed password for invalid user db2fenc1 from 68.71.22.10 port 31753 ssh2 ... |
2020-04-20 05:33:18 |
| 78.128.113.75 | attackbotsspam | 2020-04-19T22:16:30.421010l03.customhost.org.uk postfix/smtps/smtpd[19988]: warning: unknown[78.128.113.75]: SASL PLAIN authentication failed: authentication failure 2020-04-19T22:16:34.306333l03.customhost.org.uk postfix/smtps/smtpd[19988]: warning: unknown[78.128.113.75]: SASL PLAIN authentication failed: authentication failure 2020-04-19T22:17:17.175090l03.customhost.org.uk postfix/smtps/smtpd[19988]: warning: unknown[78.128.113.75]: SASL PLAIN authentication failed: authentication failure 2020-04-19T22:17:22.110797l03.customhost.org.uk postfix/smtps/smtpd[19988]: warning: unknown[78.128.113.75]: SASL PLAIN authentication failed: authentication failure ... |
2020-04-20 05:28:20 |
| 62.12.108.238 | attackspam | Apr 19 22:51:06 legacy sshd[20279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.12.108.238 Apr 19 22:51:08 legacy sshd[20279]: Failed password for invalid user vh from 62.12.108.238 port 55095 ssh2 Apr 19 22:56:12 legacy sshd[20607]: Failed password for root from 62.12.108.238 port 42295 ssh2 ... |
2020-04-20 05:27:11 |
| 45.55.145.31 | attackbots | Apr 19 23:17:19 server sshd[16966]: Failed password for invalid user monitor from 45.55.145.31 port 59881 ssh2 Apr 19 23:21:37 server sshd[20342]: Failed password for invalid user hg from 45.55.145.31 port 41459 ssh2 Apr 19 23:25:57 server sshd[23520]: Failed password for invalid user yv from 45.55.145.31 port 51266 ssh2 |
2020-04-20 05:43:01 |
| 138.197.151.213 | attackspambots | Apr 19 22:58:20 legacy sshd[20752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 Apr 19 22:58:22 legacy sshd[20752]: Failed password for invalid user kg from 138.197.151.213 port 57600 ssh2 Apr 19 23:02:19 legacy sshd[21110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 ... |
2020-04-20 05:15:13 |