City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.7.45.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.7.45.30. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121600 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 13:58:38 CST 2025
;; MSG SIZE rcvd: 103
30.45.7.85.in-addr.arpa domain name pointer 30.45.7.85.dynamic.cust.swisscom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
30.45.7.85.in-addr.arpa name = 30.45.7.85.dynamic.cust.swisscom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.243.14.185 | attack | SSH Brute Force, server-1 sshd[25250]: Failed password for invalid user apache from 162.243.14.185 port 50858 ssh2 |
2019-08-19 03:17:07 |
| 39.41.184.210 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2019-08-19 03:07:07 |
| 128.199.216.13 | attackspam | Aug 18 23:47:28 lcl-usvr-02 sshd[14502]: Invalid user distcache from 128.199.216.13 port 34542 Aug 18 23:47:28 lcl-usvr-02 sshd[14502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.216.13 Aug 18 23:47:28 lcl-usvr-02 sshd[14502]: Invalid user distcache from 128.199.216.13 port 34542 Aug 18 23:47:31 lcl-usvr-02 sshd[14502]: Failed password for invalid user distcache from 128.199.216.13 port 34542 ssh2 Aug 18 23:52:10 lcl-usvr-02 sshd[15559]: Invalid user thiago from 128.199.216.13 port 51582 ... |
2019-08-19 02:42:07 |
| 217.168.66.34 | attackspambots | Aug 18 15:59:42 srv-4 sshd\[29646\]: Invalid user admin from 217.168.66.34 Aug 18 15:59:42 srv-4 sshd\[29646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.168.66.34 Aug 18 15:59:45 srv-4 sshd\[29646\]: Failed password for invalid user admin from 217.168.66.34 port 45823 ssh2 ... |
2019-08-19 03:21:02 |
| 223.202.201.210 | attackspam | Aug 18 11:58:25 Tower sshd[6367]: Connection from 223.202.201.210 port 59622 on 192.168.10.220 port 22 Aug 18 11:58:28 Tower sshd[6367]: Invalid user gautam from 223.202.201.210 port 59622 Aug 18 11:58:28 Tower sshd[6367]: error: Could not get shadow information for NOUSER Aug 18 11:58:28 Tower sshd[6367]: Failed password for invalid user gautam from 223.202.201.210 port 59622 ssh2 Aug 18 11:58:29 Tower sshd[6367]: Received disconnect from 223.202.201.210 port 59622:11: Bye Bye [preauth] Aug 18 11:58:29 Tower sshd[6367]: Disconnected from invalid user gautam 223.202.201.210 port 59622 [preauth] |
2019-08-19 03:27:06 |
| 167.99.144.82 | attack | Aug 18 17:55:35 hb sshd\[24533\]: Invalid user ryank from 167.99.144.82 Aug 18 17:55:35 hb sshd\[24533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.144.82 Aug 18 17:55:36 hb sshd\[24533\]: Failed password for invalid user ryank from 167.99.144.82 port 59052 ssh2 Aug 18 17:59:43 hb sshd\[24881\]: Invalid user eberhard from 167.99.144.82 Aug 18 17:59:43 hb sshd\[24881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.144.82 |
2019-08-19 03:19:07 |
| 107.173.26.170 | attackbots | Aug 18 22:13:27 www sshd\[44384\]: Invalid user pilar from 107.173.26.170 Aug 18 22:13:27 www sshd\[44384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.26.170 Aug 18 22:13:29 www sshd\[44384\]: Failed password for invalid user pilar from 107.173.26.170 port 42614 ssh2 ... |
2019-08-19 03:20:15 |
| 41.63.6.120 | attackbotsspam | firewall-block, port(s): 445/tcp |
2019-08-19 03:04:13 |
| 124.127.133.158 | attackspambots | Aug 18 09:14:01 lcdev sshd\[29737\]: Invalid user camera from 124.127.133.158 Aug 18 09:14:01 lcdev sshd\[29737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.133.158 Aug 18 09:14:03 lcdev sshd\[29737\]: Failed password for invalid user camera from 124.127.133.158 port 44764 ssh2 Aug 18 09:18:37 lcdev sshd\[30214\]: Invalid user st from 124.127.133.158 Aug 18 09:18:37 lcdev sshd\[30214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.133.158 |
2019-08-19 03:26:35 |
| 186.206.134.122 | attackbotsspam | Aug 18 18:45:03 MK-Soft-VM4 sshd\[24261\]: Invalid user lfs from 186.206.134.122 port 46476 Aug 18 18:45:03 MK-Soft-VM4 sshd\[24261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.134.122 Aug 18 18:45:05 MK-Soft-VM4 sshd\[24261\]: Failed password for invalid user lfs from 186.206.134.122 port 46476 ssh2 ... |
2019-08-19 03:09:14 |
| 164.68.112.133 | attackbots | Automatic report - SSH Brute-Force Attack |
2019-08-19 03:13:54 |
| 92.234.114.90 | attack | Fail2Ban Ban Triggered |
2019-08-19 03:00:17 |
| 171.8.199.77 | attack | Aug 18 05:41:42 web1 sshd\[4185\]: Invalid user penelope from 171.8.199.77 Aug 18 05:41:42 web1 sshd\[4185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.8.199.77 Aug 18 05:41:44 web1 sshd\[4185\]: Failed password for invalid user penelope from 171.8.199.77 port 56594 ssh2 Aug 18 05:48:08 web1 sshd\[4806\]: Invalid user lolo from 171.8.199.77 Aug 18 05:48:08 web1 sshd\[4806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.8.199.77 |
2019-08-19 03:16:47 |
| 103.79.164.192 | attackbotsspam | : |
2019-08-19 02:44:24 |
| 187.216.127.147 | attackspambots | Aug 18 14:04:23 MK-Soft-VM4 sshd\[13202\]: Invalid user che from 187.216.127.147 port 51770 Aug 18 14:04:23 MK-Soft-VM4 sshd\[13202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.216.127.147 Aug 18 14:04:25 MK-Soft-VM4 sshd\[13202\]: Failed password for invalid user che from 187.216.127.147 port 51770 ssh2 ... |
2019-08-19 02:41:51 |