City: Graz
Region: Steiermark
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.27.119.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.27.119.103.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 12:50:27 CST 2025
;; MSG SIZE  rcvd: 107
        103.119.27.129.in-addr.arpa domain name pointer ftg-pc-103.ftg.tugraz.at.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
103.119.27.129.in-addr.arpa	name = ftg-pc-103.ftg.tugraz.at.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 50.242.197.226 | attackbotsspam | Port Scan detected! ...  | 
                    2020-06-04 18:28:59 | 
| 128.199.159.160 | attackspam | DATE:2020-06-04 09:50:08, IP:128.199.159.160, PORT:ssh SSH brute force auth (docker-dc)  | 
                    2020-06-04 18:36:49 | 
| 49.235.233.73 | attack | Jun 4 07:33:41 vps687878 sshd\[13961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.233.73 user=root Jun 4 07:33:43 vps687878 sshd\[13961\]: Failed password for root from 49.235.233.73 port 48074 ssh2 Jun 4 07:37:22 vps687878 sshd\[14434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.233.73 user=root Jun 4 07:37:24 vps687878 sshd\[14434\]: Failed password for root from 49.235.233.73 port 60928 ssh2 Jun 4 07:41:01 vps687878 sshd\[15107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.233.73 user=root ...  | 
                    2020-06-04 18:16:11 | 
| 91.98.59.117 | attackbots | Unauthorized IMAP connection attempt  | 
                    2020-06-04 18:34:56 | 
| 62.210.242.66 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:  | 
                    2020-06-04 18:13:39 | 
| 162.243.145.77 | attack | firewall-block, port(s): 102/tcp  | 
                    2020-06-04 18:04:48 | 
| 68.183.40.170 | attackspam | WordPress wp-login brute force :: 68.183.40.170 0.072 BYPASS [04/Jun/2020:05:48:04 0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2288 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2020-06-04 18:26:37 | 
| 87.246.7.108 | attackbots | (smtpauth) Failed SMTP AUTH login from 87.246.7.108 (BG/Bulgaria/108.0-255.7.246.87.in-addr.arpa): 3 in the last 3600 secs  | 
                    2020-06-04 18:26:18 | 
| 204.2.62.162 | attack | Jun 4 03:48:02 abusebot-6 vsftpd[30714]: pam_unix(vsftpd:auth): authentication failure; logname= uid=0 euid=0 tty=ftp ruser=user rhost=::ffff:204.2.62.162 Jun 4 03:48:05 abusebot-6 vsftpd[30719]: pam_unix(vsftpd:auth): authentication failure; logname= uid=0 euid=0 tty=ftp ruser=user rhost=::ffff:204.2.62.162 Jun 4 03:48:08 abusebot-6 vsftpd[30726]: pam_unix(vsftpd:auth): authentication failure; logname= uid=0 euid=0 tty=ftp ruser=user rhost=::ffff:204.2.62.162 ...  | 
                    2020-06-04 18:37:38 | 
| 200.41.199.250 | attack | 5x Failed Password  | 
                    2020-06-04 18:02:00 | 
| 139.155.6.87 | attack | Jun 4 07:21:40 buvik sshd[3350]: Failed password for root from 139.155.6.87 port 43954 ssh2 Jun 4 07:26:50 buvik sshd[3962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.6.87 user=root Jun 4 07:26:51 buvik sshd[3962]: Failed password for root from 139.155.6.87 port 49530 ssh2 ...  | 
                    2020-06-04 18:06:19 | 
| 222.186.15.115 | attackspambots | $f2bV_matches  | 
                    2020-06-04 18:07:52 | 
| 148.235.57.184 | attackspam | $f2bV_matches  | 
                    2020-06-04 18:27:21 | 
| 27.72.88.87 | attack | Honeypot attack, port: 445, PTR: dynamic-adsl.viettel.vn.  | 
                    2020-06-04 18:00:26 | 
| 103.214.129.204 | attackbots | Jun 4 10:51:41 melroy-server sshd[3960]: Failed password for root from 103.214.129.204 port 45704 ssh2 ...  | 
                    2020-06-04 18:15:04 |