City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.5.80.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;95.5.80.42. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:36:59 CST 2025
;; MSG SIZE rcvd: 103
42.80.5.95.in-addr.arpa domain name pointer 95.5.80.42.static.ttnet.com.tr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.80.5.95.in-addr.arpa name = 95.5.80.42.static.ttnet.com.tr.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.241.218.130 | attackspambots | firewall-block, port(s): 465/tcp |
2020-03-04 21:38:28 |
| 117.50.63.247 | attackbotsspam | 2020-03-04T11:12:18.966451vps751288.ovh.net sshd\[20038\]: Invalid user dev from 117.50.63.247 port 34172 2020-03-04T11:12:18.976408vps751288.ovh.net sshd\[20038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.63.247 2020-03-04T11:12:21.331649vps751288.ovh.net sshd\[20038\]: Failed password for invalid user dev from 117.50.63.247 port 34172 ssh2 2020-03-04T11:21:15.761950vps751288.ovh.net sshd\[20095\]: Invalid user odoo from 117.50.63.247 port 32908 2020-03-04T11:21:15.770012vps751288.ovh.net sshd\[20095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.63.247 |
2020-03-04 21:06:42 |
| 14.29.214.91 | attack | Mar 4 09:01:53 localhost sshd\[10754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.91 user=root Mar 4 09:01:56 localhost sshd\[10754\]: Failed password for root from 14.29.214.91 port 40805 ssh2 Mar 4 09:09:04 localhost sshd\[11087\]: Invalid user minecraft from 14.29.214.91 Mar 4 09:09:04 localhost sshd\[11087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.91 Mar 4 09:09:06 localhost sshd\[11087\]: Failed password for invalid user minecraft from 14.29.214.91 port 49627 ssh2 ... |
2020-03-04 21:03:10 |
| 104.131.13.199 | attackbotsspam | Mar 4 13:10:16 srv-ubuntu-dev3 sshd[26501]: Invalid user updater from 104.131.13.199 Mar 4 13:10:16 srv-ubuntu-dev3 sshd[26501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.13.199 Mar 4 13:10:16 srv-ubuntu-dev3 sshd[26501]: Invalid user updater from 104.131.13.199 Mar 4 13:10:18 srv-ubuntu-dev3 sshd[26501]: Failed password for invalid user updater from 104.131.13.199 port 51356 ssh2 Mar 4 13:10:47 srv-ubuntu-dev3 sshd[26574]: Invalid user seongmin from 104.131.13.199 Mar 4 13:10:47 srv-ubuntu-dev3 sshd[26574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.13.199 Mar 4 13:10:47 srv-ubuntu-dev3 sshd[26574]: Invalid user seongmin from 104.131.13.199 Mar 4 13:10:49 srv-ubuntu-dev3 sshd[26574]: Failed password for invalid user seongmin from 104.131.13.199 port 58060 ssh2 Mar 4 13:11:15 srv-ubuntu-dev3 sshd[26650]: Invalid user test from 104.131.13.199 ... |
2020-03-04 21:17:37 |
| 92.47.92.43 | attackbotsspam | 2020-03-03 22:35:12 H=([92.47.92.43]) [92.47.92.43]:31930 I=[192.147.25.65]:25 F= |
2020-03-04 21:11:39 |
| 183.83.217.94 | attack | Automatic report - Banned IP Access |
2020-03-04 21:16:41 |
| 42.159.83.169 | attackbots | Mar 4 06:02:11 targaryen sshd[20020]: Invalid user eupa from 42.159.83.169 Mar 4 06:08:37 targaryen sshd[20062]: Invalid user eupa from 42.159.83.169 Mar 4 06:15:02 targaryen sshd[20226]: Invalid user ubuntu from 42.159.83.169 Mar 4 06:21:32 targaryen sshd[20269]: Invalid user www from 42.159.83.169 ... |
2020-03-04 21:14:23 |
| 148.70.68.175 | attack | Mar 4 13:57:26 localhost sshd\[22757\]: Invalid user tester from 148.70.68.175 port 40762 Mar 4 13:57:26 localhost sshd\[22757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.68.175 Mar 4 13:57:29 localhost sshd\[22757\]: Failed password for invalid user tester from 148.70.68.175 port 40762 ssh2 |
2020-03-04 21:11:06 |
| 139.59.90.31 | attack | Brute-force attempt banned |
2020-03-04 21:40:09 |
| 84.54.97.108 | attackspam | Email rejected due to spam filtering |
2020-03-04 21:18:14 |
| 114.220.76.79 | attackbots | DATE:2020-03-04 07:59:02, IP:114.220.76.79, PORT:ssh SSH brute force auth (docker-dc) |
2020-03-04 21:18:41 |
| 145.239.73.103 | attackspam | Mar 4 02:41:17 hpm sshd\[31010\]: Invalid user dspace from 145.239.73.103 Mar 4 02:41:17 hpm sshd\[31010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.ip-145-239-73.eu Mar 4 02:41:19 hpm sshd\[31010\]: Failed password for invalid user dspace from 145.239.73.103 port 60660 ssh2 Mar 4 02:49:52 hpm sshd\[31805\]: Invalid user media from 145.239.73.103 Mar 4 02:49:52 hpm sshd\[31805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.ip-145-239-73.eu |
2020-03-04 21:12:30 |
| 220.149.231.165 | attackbots | Brute-force attempt banned |
2020-03-04 21:17:15 |
| 128.201.21.22 | attackspam | Email rejected due to spam filtering |
2020-03-04 21:07:56 |
| 183.89.214.107 | attack | postfix/smtpd\[19684\]: warning: SASL PLAIN authentication |
2020-03-04 21:25:39 |