City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.45.52.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31681
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.45.52.85. IN A
;; AUTHORITY SECTION:
. 2967 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019060401 1800 900 604800 86400
;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 05 09:03:29 CST 2019
;; MSG SIZE rcvd: 115
85.52.45.85.in-addr.arpa domain name pointer host85-52-static.45-85-b.business.telecomitalia.it.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
85.52.45.85.in-addr.arpa name = host85-52-static.45-85-b.business.telecomitalia.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 157.230.30.98 | attack | IP 157.230.30.98 attacked honeypot on port: 9000 at 9/6/2020 3:28:03 AM |
2020-09-06 19:48:44 |
| 104.140.188.58 | attackspam | TCP port : 5432 |
2020-09-06 19:40:36 |
| 104.244.78.231 | attack | Sep 6 16:44:06 lunarastro sshd[5380]: Failed password for root from 104.244.78.231 port 55124 ssh2 Sep 6 16:44:10 lunarastro sshd[5380]: Failed password for root from 104.244.78.231 port 55124 ssh2 |
2020-09-06 19:39:43 |
| 93.43.223.61 | attackspam | IP attempted unauthorised action |
2020-09-06 20:01:15 |
| 71.19.250.131 | attack | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2020-09-06 19:44:23 |
| 193.228.135.144 | attackbots | DATE:2020-09-05 18:39:43, IP:193.228.135.144, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-09-06 19:57:15 |
| 187.178.160.230 | attack | Automatic report - Port Scan Attack |
2020-09-06 20:01:51 |
| 157.39.61.172 | attackbotsspam | Icarus honeypot on github |
2020-09-06 20:02:39 |
| 103.131.71.169 | attackspam | (mod_security) mod_security (id:210730) triggered by 103.131.71.169 (VN/Vietnam/bot-103-131-71-169.coccoc.com): 5 in the last 3600 secs |
2020-09-06 19:44:06 |
| 139.99.219.208 | attackspambots | (sshd) Failed SSH login from 139.99.219.208 (AU/Australia/-): 10 in the last 3600 secs |
2020-09-06 19:51:51 |
| 162.142.125.30 | attackspam |
|
2020-09-06 19:31:00 |
| 199.241.138.126 | attack | firewall-block, port(s): 22/tcp |
2020-09-06 20:06:09 |
| 23.235.212.50 | attackbots | email spam |
2020-09-06 20:07:23 |
| 102.68.137.139 | attackbots | TCP ports : 1615 / 2295 / 12969 / 15156 / 27429 / 29179 |
2020-09-06 20:00:58 |
| 45.148.9.197 | attack | E-Mail Spam |
2020-09-06 19:32:48 |