City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.214.250.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.214.250.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 06:06:11 CST 2025
;; MSG SIZE rcvd: 106
55.250.214.85.in-addr.arpa domain name pointer h2894298.stratoserver.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
55.250.214.85.in-addr.arpa name = h2894298.stratoserver.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
112.169.9.150 | attackspambots | Oct 15 11:06:36 hanapaa sshd\[1407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.9.150 user=root Oct 15 11:06:37 hanapaa sshd\[1407\]: Failed password for root from 112.169.9.150 port 65279 ssh2 Oct 15 11:10:58 hanapaa sshd\[1941\]: Invalid user addons from 112.169.9.150 Oct 15 11:10:58 hanapaa sshd\[1941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.9.150 Oct 15 11:11:00 hanapaa sshd\[1941\]: Failed password for invalid user addons from 112.169.9.150 port 48010 ssh2 |
2019-10-16 05:32:16 |
113.169.99.68 | attackbots | 34567/tcp [2019-10-15]1pkt |
2019-10-16 05:54:42 |
156.208.18.30 | attack | 23/tcp [2019-10-15]1pkt |
2019-10-16 05:50:28 |
201.242.213.28 | attackspambots | 445/tcp [2019-10-15]1pkt |
2019-10-16 05:46:33 |
94.158.36.34 | attackspam | Automatic report - Port Scan Attack |
2019-10-16 05:36:46 |
123.189.88.122 | attack | " " |
2019-10-16 05:36:26 |
1.171.26.146 | attack | Fail2Ban Ban Triggered |
2019-10-16 05:21:53 |
81.190.192.235 | attack | Invalid user ubnt from 81.190.192.235 port 52875 |
2019-10-16 05:31:03 |
89.222.167.174 | attack | 85/tcp [2019-10-15]1pkt |
2019-10-16 05:34:52 |
116.89.12.18 | attackspambots | Oct 15 19:57:27 anodpoucpklekan sshd[65279]: Invalid user pi from 116.89.12.18 port 54656 Oct 15 19:57:27 anodpoucpklekan sshd[65280]: Invalid user pi from 116.89.12.18 port 54658 ... |
2019-10-16 05:46:56 |
122.115.230.183 | attackbotsspam | 2019-10-15T21:34:26.693073abusebot-3.cloudsearch.cf sshd\[27074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.115.230.183 user=root |
2019-10-16 05:59:53 |
91.241.214.238 | attackspambots | 23/tcp [2019-10-15]1pkt |
2019-10-16 05:41:25 |
185.216.140.180 | attackspam | 10/15/2019-23:45:55.888254 185.216.140.180 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306 |
2019-10-16 06:00:58 |
106.12.82.84 | attackspam | Oct 15 23:55:28 dedicated sshd[1608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.82.84 user=root Oct 15 23:55:30 dedicated sshd[1608]: Failed password for root from 106.12.82.84 port 52168 ssh2 |
2019-10-16 05:59:07 |
69.94.131.61 | attack | Autoban 69.94.131.61 AUTH/CONNECT |
2019-10-16 06:02:28 |