City: Athens
Region: Attiki
Country: Greece
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.74.131.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.74.131.107. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 13:25:41 CST 2025
;; MSG SIZE rcvd: 106
107.131.74.85.in-addr.arpa domain name pointer athedsl-207821.home.otenet.gr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
107.131.74.85.in-addr.arpa name = athedsl-207821.home.otenet.gr.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 88.214.11.71 | attackbots | proto=tcp . spt=57451 . dpt=25 . (listed on Blocklist de Aug 15) (812) |
2019-08-16 12:02:36 |
| 180.250.115.98 | attack | Aug 15 18:18:28 aiointranet sshd\[9900\]: Invalid user jenkins from 180.250.115.98 Aug 15 18:18:28 aiointranet sshd\[9900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.98 Aug 15 18:18:30 aiointranet sshd\[9900\]: Failed password for invalid user jenkins from 180.250.115.98 port 60870 ssh2 Aug 15 18:24:02 aiointranet sshd\[10392\]: Invalid user programacion from 180.250.115.98 Aug 15 18:24:02 aiointranet sshd\[10392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.98 |
2019-08-16 12:33:39 |
| 58.248.254.124 | attack | Aug 15 19:06:33 vps200512 sshd\[26086\]: Invalid user cgi from 58.248.254.124 Aug 15 19:06:33 vps200512 sshd\[26086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.248.254.124 Aug 15 19:06:36 vps200512 sshd\[26086\]: Failed password for invalid user cgi from 58.248.254.124 port 39601 ssh2 Aug 15 19:10:38 vps200512 sshd\[26258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.248.254.124 user=root Aug 15 19:10:40 vps200512 sshd\[26258\]: Failed password for root from 58.248.254.124 port 57950 ssh2 |
2019-08-16 11:58:50 |
| 207.148.72.137 | attack | 5432/tcp [2019-08-15]1pkt |
2019-08-16 12:22:37 |
| 200.116.105.213 | attackbotsspam | Invalid user git from 200.116.105.213 port 53796 |
2019-08-16 12:24:09 |
| 103.221.254.73 | attackspambots | proto=tcp . spt=38601 . dpt=25 . (listed on Blocklist de Aug 15) (813) |
2019-08-16 11:59:49 |
| 124.88.34.144 | attackbots | Aug 15 22:50:54 ubuntu-2gb-nbg1-dc3-1 sshd[10716]: Failed password for root from 124.88.34.144 port 44140 ssh2 Aug 15 22:51:01 ubuntu-2gb-nbg1-dc3-1 sshd[10716]: Failed password for root from 124.88.34.144 port 44140 ssh2 ... |
2019-08-16 12:13:05 |
| 113.104.128.187 | attack | Port Scan: TCP/23 |
2019-08-16 11:59:20 |
| 73.82.168.112 | attackbots | Aug 16 05:59:17 ubuntu-2gb-nbg1-dc3-1 sshd[9699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.82.168.112 Aug 16 05:59:19 ubuntu-2gb-nbg1-dc3-1 sshd[9699]: Failed password for invalid user simple from 73.82.168.112 port 51196 ssh2 ... |
2019-08-16 12:21:55 |
| 177.37.71.42 | attackspambots | leo_www |
2019-08-16 12:18:34 |
| 91.96.228.55 | attackbots | TCP Port: 25 _ invalid blocked dnsbl-sorbs abuseat-org _ _ _ _ (811) |
2019-08-16 12:23:25 |
| 186.225.51.58 | attack | port scan and connect, tcp 23 (telnet) |
2019-08-16 12:01:18 |
| 157.230.88.60 | attackbots | Aug 16 05:43:37 nextcloud sshd\[28959\]: Invalid user eddie from 157.230.88.60 Aug 16 05:43:37 nextcloud sshd\[28959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.88.60 Aug 16 05:43:40 nextcloud sshd\[28959\]: Failed password for invalid user eddie from 157.230.88.60 port 45492 ssh2 ... |
2019-08-16 12:40:09 |
| 52.172.44.97 | attack | 2019-08-16T02:53:13.916402abusebot-6.cloudsearch.cf sshd\[2438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.44.97 user=root |
2019-08-16 12:15:54 |
| 157.230.101.167 | attackspam | Aug 16 05:29:10 relay postfix/smtpd\[28767\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 16 05:47:20 relay postfix/smtpd\[31324\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 16 05:47:20 relay postfix/smtpd\[28767\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 16 05:47:55 relay postfix/smtpd\[28767\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 16 05:48:01 relay postfix/smtpd\[32118\]: warning: unknown\[157.230.101.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-08-16 12:29:13 |