City: Niederweningen
Region: Zurich
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.132.197.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.132.197.53. IN A
;; AUTHORITY SECTION:
. 361 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023050601 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 07 10:12:39 CST 2023
;; MSG SIZE rcvd: 107
53.197.132.129.in-addr.arpa domain name pointer ames.ethz.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
53.197.132.129.in-addr.arpa name = ames.ethz.ch.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
107.216.104.94 | attackspam | 9000/tcp [2019-08-11]1pkt |
2019-08-12 09:52:26 |
78.187.230.26 | attackspam | Automatic report - Port Scan Attack |
2019-08-12 10:22:36 |
82.151.114.197 | attackspam | fail2ban honeypot |
2019-08-12 09:56:06 |
186.92.51.248 | attackbots | 445/tcp 445/tcp 445/tcp... [2019-08-11]6pkt,1pt.(tcp) |
2019-08-12 09:51:47 |
36.230.149.111 | attackspam | Honeypot attack, port: 23, PTR: 36-230-149-111.dynamic-ip.hinet.net. |
2019-08-12 09:39:57 |
193.32.161.150 | attackbots | Honeypot attack, port: 81, PTR: PTR record not found |
2019-08-12 10:13:01 |
162.243.136.28 | attackspam | : |
2019-08-12 10:04:16 |
37.59.9.195 | attackbots | 37.59.9.195 - - [11/Aug/2019:23:33:38 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.59.9.195 - - [11/Aug/2019:23:33:38 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.59.9.195 - - [11/Aug/2019:23:33:38 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.59.9.195 - - [11/Aug/2019:23:33:38 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.59.9.195 - - [11/Aug/2019:23:33:38 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.59.9.195 - - [11/Aug/2019:23:33:38 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-08-12 09:54:25 |
177.89.142.184 | attack | CloudCIX Reconnaissance Scan Detected, PTR: 177-89-142-184.cable.cabotelecom.com.br. |
2019-08-12 10:09:08 |
212.164.219.160 | attack | Aug 11 21:22:10 www sshd\[26101\]: Invalid user forest from 212.164.219.160 Aug 11 21:22:10 www sshd\[26101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.164.219.160 Aug 11 21:22:12 www sshd\[26101\]: Failed password for invalid user forest from 212.164.219.160 port 52508 ssh2 ... |
2019-08-12 09:52:53 |
51.158.100.127 | attackbotsspam | Automatic report - Banned IP Access |
2019-08-12 09:50:34 |
50.62.176.93 | attackbotsspam | fail2ban honeypot |
2019-08-12 09:38:54 |
107.170.235.19 | attack | vps1:sshd-InvalidUser |
2019-08-12 10:03:25 |
42.112.202.27 | attackbots | 23/tcp [2019-08-11]1pkt |
2019-08-12 10:14:40 |
184.154.47.2 | attack | [portscan] Port scan |
2019-08-12 10:06:10 |