City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.241.86.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.241.86.172.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 00:06:14 CST 2025
;; MSG SIZE  rcvd: 106172.86.241.89.in-addr.arpa domain name pointer host-89-241-86-172.as13285.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
172.86.241.89.in-addr.arpa	name = host-89-241-86-172.as13285.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 182.74.25.246 | attack | Feb 8 16:20:15 server sshd\[19069\]: Invalid user khs from 182.74.25.246 Feb 8 16:20:15 server sshd\[19069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 Feb 8 16:20:17 server sshd\[19069\]: Failed password for invalid user khs from 182.74.25.246 port 56578 ssh2 Feb 8 16:41:51 server sshd\[22736\]: Invalid user duz from 182.74.25.246 Feb 8 16:41:51 server sshd\[22736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 ... | 2020-02-08 21:51:04 | 
| 184.105.247.194 | attackspambots | firewall-block, port(s): 8443/tcp | 2020-02-08 22:02:58 | 
| 187.75.158.1 | attackbots | Feb 8 09:10:56 plusreed sshd[15399]: Invalid user bca from 187.75.158.1 ... | 2020-02-08 22:17:57 | 
| 40.77.167.10 | attackbots | Automatic report - Banned IP Access | 2020-02-08 22:22:14 | 
| 44.224.22.196 | attackspam | 404 NOT FOUND | 2020-02-08 22:17:01 | 
| 185.142.236.34 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - | 2020-02-08 22:02:14 | 
| 218.241.251.217 | attackbots | Feb 8 14:19:51 Ubuntu-1404-trusty-64-minimal sshd\[9764\]: Invalid user wgj from 218.241.251.217 Feb 8 14:19:51 Ubuntu-1404-trusty-64-minimal sshd\[9764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.251.217 Feb 8 14:19:53 Ubuntu-1404-trusty-64-minimal sshd\[9764\]: Failed password for invalid user wgj from 218.241.251.217 port 28153 ssh2 Feb 8 14:40:19 Ubuntu-1404-trusty-64-minimal sshd\[23492\]: Invalid user qgw from 218.241.251.217 Feb 8 14:40:19 Ubuntu-1404-trusty-64-minimal sshd\[23492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.251.217 | 2020-02-08 22:00:48 | 
| 79.114.56.148 | attackbots | firewall-block, port(s): 21/tcp, 22/tcp, 80/tcp, 8080/tcp | 2020-02-08 22:11:35 | 
| 49.233.195.198 | attackbotsspam | Automatic report - SSH Brute-Force Attack | 2020-02-08 21:48:16 | 
| 85.93.20.66 | attack | 20 attempts against mh-misbehave-ban on float | 2020-02-08 22:15:20 | 
| 190.9.130.159 | attackspam | Feb 8 14:05:55 web8 sshd\[25771\]: Invalid user kgw from 190.9.130.159 Feb 8 14:05:55 web8 sshd\[25771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.9.130.159 Feb 8 14:05:57 web8 sshd\[25771\]: Failed password for invalid user kgw from 190.9.130.159 port 54940 ssh2 Feb 8 14:08:22 web8 sshd\[26900\]: Invalid user onj from 190.9.130.159 Feb 8 14:08:22 web8 sshd\[26900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.9.130.159 | 2020-02-08 22:20:29 | 
| 172.104.109.160 | attackbots | firewall-block, port(s): 7001/tcp | 2020-02-08 22:05:28 | 
| 111.229.28.34 | attackspambots | Feb 8 10:36:03 firewall sshd[20984]: Invalid user wjf from 111.229.28.34 Feb 8 10:36:05 firewall sshd[20984]: Failed password for invalid user wjf from 111.229.28.34 port 38796 ssh2 Feb 8 10:40:29 firewall sshd[21139]: Invalid user xun from 111.229.28.34 ... | 2020-02-08 21:52:24 | 
| 92.118.160.53 | attack | firewall-block, port(s): 3493/tcp | 2020-02-08 22:07:55 | 
| 144.217.193.111 | attack | PHI,DEF GET /w00tw00t.at.ISC.SANS.DFind:) | 2020-02-08 22:25:51 |