City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.2.254.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52856
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.2.254.116. IN A
;; AUTHORITY SECTION:
. 566 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 08:00:11 CST 2023
;; MSG SIZE rcvd: 105
116.254.2.85.in-addr.arpa domain name pointer 116.254.2.85.dynamic.wline.res.cust.swisscom.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
116.254.2.85.in-addr.arpa name = 116.254.2.85.dynamic.wline.res.cust.swisscom.ch.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 164.132.225.250 | attack | Dec 3 03:27:42 server sshd\[28099\]: Failed password for invalid user backup from 164.132.225.250 port 39176 ssh2 Dec 3 17:20:22 server sshd\[21794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=250.ip-164-132-225.eu user=root Dec 3 17:20:25 server sshd\[21794\]: Failed password for root from 164.132.225.250 port 44390 ssh2 Dec 3 17:28:46 server sshd\[23747\]: Invalid user test from 164.132.225.250 Dec 3 17:28:46 server sshd\[23747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=250.ip-164-132-225.eu ... |
2019-12-04 01:00:31 |
| 62.234.122.199 | attack | 2019-12-03T16:14:11.098725abusebot-7.cloudsearch.cf sshd\[3992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.122.199 user=root |
2019-12-04 00:37:25 |
| 2.136.131.36 | attack | SSH Brute-Force attacks |
2019-12-04 01:01:21 |
| 203.195.207.40 | attackspambots | no |
2019-12-04 00:52:58 |
| 185.38.3.138 | attackspam | Dec 3 15:59:45 pornomens sshd\[12935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.38.3.138 user=root Dec 3 15:59:47 pornomens sshd\[12935\]: Failed password for root from 185.38.3.138 port 44254 ssh2 Dec 3 16:09:13 pornomens sshd\[13051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.38.3.138 user=root ... |
2019-12-04 01:00:01 |
| 118.89.39.81 | attackspam | 2019-12-03T15:18:58.604394abusebot-2.cloudsearch.cf sshd\[6050\]: Invalid user admin from 118.89.39.81 port 55436 |
2019-12-04 00:20:53 |
| 106.12.203.177 | attackspam | Dec 3 15:28:10 zeus sshd[5492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.203.177 Dec 3 15:28:12 zeus sshd[5492]: Failed password for invalid user password from 106.12.203.177 port 59328 ssh2 Dec 3 15:37:17 zeus sshd[5739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.203.177 Dec 3 15:37:19 zeus sshd[5739]: Failed password for invalid user csssuser123 from 106.12.203.177 port 36044 ssh2 |
2019-12-04 00:28:44 |
| 178.128.108.19 | attack | Dec 3 17:07:23 minden010 sshd[15918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.108.19 Dec 3 17:07:24 minden010 sshd[15918]: Failed password for invalid user ghaemian from 178.128.108.19 port 41250 ssh2 Dec 3 17:13:52 minden010 sshd[18508]: Failed password for root from 178.128.108.19 port 33654 ssh2 ... |
2019-12-04 00:38:10 |
| 42.104.97.242 | attackbotsspam | Dec 3 17:24:22 ns41 sshd[956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.242 Dec 3 17:24:22 ns41 sshd[956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.242 |
2019-12-04 00:48:08 |
| 95.167.39.12 | attack | Repeated brute force against a port |
2019-12-04 00:31:31 |
| 193.112.6.241 | attack | Dec 3 04:20:53 hanapaa sshd\[19477\]: Invalid user saikumar from 193.112.6.241 Dec 3 04:20:53 hanapaa sshd\[19477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.6.241 Dec 3 04:20:55 hanapaa sshd\[19477\]: Failed password for invalid user saikumar from 193.112.6.241 port 58062 ssh2 Dec 3 04:29:00 hanapaa sshd\[20251\]: Invalid user allys from 193.112.6.241 Dec 3 04:29:00 hanapaa sshd\[20251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.6.241 |
2019-12-04 00:45:54 |
| 188.131.142.109 | attackbotsspam | Dec 3 15:32:59 amit sshd\[7323\]: Invalid user root. from 188.131.142.109 Dec 3 15:32:59 amit sshd\[7323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.142.109 Dec 3 15:33:01 amit sshd\[7323\]: Failed password for invalid user root. from 188.131.142.109 port 34472 ssh2 ... |
2019-12-04 00:37:39 |
| 185.143.221.55 | attack | 12/03/2019-16:56:20.411507 185.143.221.55 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-12-04 00:22:30 |
| 200.108.139.242 | attackspambots | Dec 3 16:34:14 nextcloud sshd\[2819\]: Invalid user server from 200.108.139.242 Dec 3 16:34:14 nextcloud sshd\[2819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.139.242 Dec 3 16:34:16 nextcloud sshd\[2819\]: Failed password for invalid user server from 200.108.139.242 port 42247 ssh2 ... |
2019-12-04 00:40:10 |
| 106.12.36.21 | attackspam | Dec 3 17:10:47 server sshd\[19192\]: Invalid user aursnes from 106.12.36.21 Dec 3 17:10:47 server sshd\[19192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.21 Dec 3 17:10:49 server sshd\[19192\]: Failed password for invalid user aursnes from 106.12.36.21 port 58358 ssh2 Dec 3 17:28:48 server sshd\[23749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.21 user=root Dec 3 17:28:49 server sshd\[23749\]: Failed password for root from 106.12.36.21 port 44510 ssh2 ... |
2019-12-04 00:58:09 |