City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.20.229.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.20.229.220. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 20:27:04 CST 2025
;; MSG SIZE rcvd: 106
220.229.20.89.in-addr.arpa domain name pointer 220.89-20-229.enivest.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
220.229.20.89.in-addr.arpa name = 220.89-20-229.enivest.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.254.92.22 | attackspam | (From leta.starr@gmail.com) Would you like to submit your ad on thousands of advertising sites every month? One tiny investment every month will get you virtually unlimited traffic to your site forever!To find out more check out our site here: http://postmoreads.net.n3t.store |
2019-11-06 15:51:39 |
| 80.211.133.238 | attack | 2019-11-06T07:01:43.198418abusebot-8.cloudsearch.cf sshd\[28246\]: Invalid user tetriandoch from 80.211.133.238 port 55422 |
2019-11-06 15:55:40 |
| 142.93.212.168 | attackbots | Nov 5 21:33:04 hanapaa sshd\[20809\]: Invalid user 123 from 142.93.212.168 Nov 5 21:33:04 hanapaa sshd\[20809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.168 Nov 5 21:33:06 hanapaa sshd\[20809\]: Failed password for invalid user 123 from 142.93.212.168 port 36974 ssh2 Nov 5 21:37:38 hanapaa sshd\[21312\]: Invalid user franktang from 142.93.212.168 Nov 5 21:37:38 hanapaa sshd\[21312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.168 |
2019-11-06 15:46:44 |
| 211.157.189.54 | attackspambots | 2019-11-06T06:20:24.844115shield sshd\[10719\]: Invalid user ems from 211.157.189.54 port 59047 2019-11-06T06:20:24.848447shield sshd\[10719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.189.54 2019-11-06T06:20:27.110659shield sshd\[10719\]: Failed password for invalid user ems from 211.157.189.54 port 59047 ssh2 2019-11-06T06:29:39.326539shield sshd\[11788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.189.54 user=root 2019-11-06T06:29:41.448088shield sshd\[11788\]: Failed password for root from 211.157.189.54 port 37177 ssh2 |
2019-11-06 15:20:18 |
| 80.82.77.33 | attackspambots | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-11-06 15:48:04 |
| 59.52.97.130 | attackspambots | Nov 6 07:40:38 tux-35-217 sshd\[28615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.52.97.130 user=root Nov 6 07:40:40 tux-35-217 sshd\[28615\]: Failed password for root from 59.52.97.130 port 35705 ssh2 Nov 6 07:46:34 tux-35-217 sshd\[28640\]: Invalid user clamav1 from 59.52.97.130 port 52019 Nov 6 07:46:34 tux-35-217 sshd\[28640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.52.97.130 ... |
2019-11-06 15:20:06 |
| 47.94.80.125 | attack | fail2ban honeypot |
2019-11-06 15:53:29 |
| 77.247.110.58 | attack | 11/06/2019-01:29:38.067086 77.247.110.58 Protocol: 17 ET SCAN Sipvicious Scan |
2019-11-06 15:23:30 |
| 138.197.180.102 | attackbotsspam | 2019-11-06T08:23:30.143125tmaserv sshd\[13020\]: Invalid user git from 138.197.180.102 port 41568 2019-11-06T08:23:30.147975tmaserv sshd\[13020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 2019-11-06T08:23:31.942630tmaserv sshd\[13020\]: Failed password for invalid user git from 138.197.180.102 port 41568 ssh2 2019-11-06T08:28:04.847446tmaserv sshd\[13245\]: Invalid user kochieng from 138.197.180.102 port 58592 2019-11-06T08:28:04.852590tmaserv sshd\[13245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 2019-11-06T08:28:07.264626tmaserv sshd\[13245\]: Failed password for invalid user kochieng from 138.197.180.102 port 58592 ssh2 ... |
2019-11-06 15:24:50 |
| 117.169.78.21 | attackbotsspam | " " |
2019-11-06 15:52:08 |
| 129.28.148.242 | attackspam | Nov 6 02:10:30 TORMINT sshd\[6611\]: Invalid user cj from 129.28.148.242 Nov 6 02:10:30 TORMINT sshd\[6611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.148.242 Nov 6 02:10:33 TORMINT sshd\[6611\]: Failed password for invalid user cj from 129.28.148.242 port 50558 ssh2 ... |
2019-11-06 15:30:08 |
| 103.226.152.202 | attackspam | fail2ban honeypot |
2019-11-06 15:41:47 |
| 206.189.62.194 | attack | port scan and connect, tcp 8080 (http-proxy) |
2019-11-06 15:40:21 |
| 140.143.130.52 | attackspambots | Nov 5 21:44:33 hpm sshd\[12427\]: Invalid user user from 140.143.130.52 Nov 5 21:44:33 hpm sshd\[12427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.130.52 Nov 5 21:44:35 hpm sshd\[12427\]: Failed password for invalid user user from 140.143.130.52 port 33280 ssh2 Nov 5 21:49:38 hpm sshd\[12832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.130.52 user=root Nov 5 21:49:41 hpm sshd\[12832\]: Failed password for root from 140.143.130.52 port 43618 ssh2 |
2019-11-06 15:59:55 |
| 107.170.235.19 | attackbots | Nov 6 08:40:26 legacy sshd[20684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.235.19 Nov 6 08:40:28 legacy sshd[20684]: Failed password for invalid user murp from 107.170.235.19 port 51682 ssh2 Nov 6 08:44:20 legacy sshd[20811]: Failed password for root from 107.170.235.19 port 33710 ssh2 ... |
2019-11-06 15:53:08 |