City: Karaköprü
Region: Sanliurfa
Country: Turkey
Internet Service Provider: Türk Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.99.217.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.99.217.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024121100 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 00:25:23 CST 2024
;; MSG SIZE rcvd: 106
104.217.99.85.in-addr.arpa domain name pointer 85.99.217.104.static.ttnet.com.tr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
104.217.99.85.in-addr.arpa name = 85.99.217.104.static.ttnet.com.tr.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.19.141.103 | attackspam | Automatic report - Port Scan Attack |
2019-08-28 20:28:57 |
| 62.234.156.120 | attack | Invalid user niclas from 62.234.156.120 port 51335 |
2019-08-28 21:01:45 |
| 54.219.140.63 | attackbots | Aug 28 09:51:03 OPSO sshd\[1928\]: Invalid user icaro from 54.219.140.63 port 47680 Aug 28 09:51:03 OPSO sshd\[1928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.219.140.63 Aug 28 09:51:05 OPSO sshd\[1928\]: Failed password for invalid user icaro from 54.219.140.63 port 47680 ssh2 Aug 28 09:56:06 OPSO sshd\[2919\]: Invalid user test from 54.219.140.63 port 35318 Aug 28 09:56:06 OPSO sshd\[2919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.219.140.63 |
2019-08-28 20:45:27 |
| 94.102.49.190 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-08-28 20:28:26 |
| 42.104.97.238 | attackspam | Aug 28 10:39:29 MK-Soft-VM5 sshd\[18135\]: Invalid user host from 42.104.97.238 port 3872 Aug 28 10:39:29 MK-Soft-VM5 sshd\[18135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.104.97.238 Aug 28 10:39:30 MK-Soft-VM5 sshd\[18135\]: Failed password for invalid user host from 42.104.97.238 port 3872 ssh2 ... |
2019-08-28 21:15:57 |
| 179.108.240.248 | attack | failed_logins |
2019-08-28 20:48:44 |
| 167.71.217.179 | attackbotsspam | Aug 28 12:19:24 rotator sshd\[13599\]: Invalid user user from 167.71.217.179Aug 28 12:19:26 rotator sshd\[13599\]: Failed password for invalid user user from 167.71.217.179 port 56882 ssh2Aug 28 12:24:20 rotator sshd\[14466\]: Invalid user boss from 167.71.217.179Aug 28 12:24:22 rotator sshd\[14466\]: Failed password for invalid user boss from 167.71.217.179 port 47980 ssh2Aug 28 12:29:06 rotator sshd\[15293\]: Invalid user craig from 167.71.217.179Aug 28 12:29:09 rotator sshd\[15293\]: Failed password for invalid user craig from 167.71.217.179 port 39056 ssh2 ... |
2019-08-28 20:38:58 |
| 192.99.245.135 | attackspambots | Aug 28 10:11:54 sshgateway sshd\[29079\]: Invalid user edna from 192.99.245.135 Aug 28 10:11:54 sshgateway sshd\[29079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.245.135 Aug 28 10:11:56 sshgateway sshd\[29079\]: Failed password for invalid user edna from 192.99.245.135 port 41906 ssh2 |
2019-08-28 20:38:29 |
| 117.187.139.96 | attackspambots | Automatic report - Port Scan Attack |
2019-08-28 20:38:01 |
| 154.72.195.154 | attackspambots | Aug 28 13:22:26 server sshd[55172]: Failed password for invalid user jiao from 154.72.195.154 port 4435 ssh2 Aug 28 13:27:51 server sshd[57192]: Failed password for invalid user ctopup from 154.72.195.154 port 32027 ssh2 Aug 28 13:32:47 server sshd[59139]: Failed password for invalid user guinness from 154.72.195.154 port 40714 ssh2 |
2019-08-28 20:49:01 |
| 194.228.3.191 | attackspam | Aug 27 20:00:07 php2 sshd\[4415\]: Invalid user rony from 194.228.3.191 Aug 27 20:00:07 php2 sshd\[4415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.3.191 Aug 27 20:00:09 php2 sshd\[4415\]: Failed password for invalid user rony from 194.228.3.191 port 39223 ssh2 Aug 27 20:04:22 php2 sshd\[4774\]: Invalid user admin1 from 194.228.3.191 Aug 27 20:04:22 php2 sshd\[4774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.3.191 |
2019-08-28 20:41:51 |
| 39.96.2.50 | attack | 19/8/28@00:19:51: FAIL: IoT-Telnet address from=39.96.2.50 ... |
2019-08-28 20:39:27 |
| 59.42.62.235 | attackspam | Fail2Ban - SSH Bruteforce Attempt |
2019-08-28 20:56:45 |
| 92.222.66.234 | attackbots | Invalid user vinci from 92.222.66.234 port 52104 |
2019-08-28 20:47:41 |
| 156.67.217.244 | attackspam | Aug 28 02:51:07 aiointranet sshd\[6758\]: Invalid user python from 156.67.217.244 Aug 28 02:51:07 aiointranet sshd\[6758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.217.244 Aug 28 02:51:09 aiointranet sshd\[6758\]: Failed password for invalid user python from 156.67.217.244 port 46734 ssh2 Aug 28 02:55:59 aiointranet sshd\[7166\]: Invalid user ar from 156.67.217.244 Aug 28 02:55:59 aiointranet sshd\[7166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.217.244 |
2019-08-28 21:04:27 |