City: Mainz
Region: Rheinland-Pfalz
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.93.23.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.93.23.59. IN A
;; AUTHORITY SECTION:
. 504 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022102000 1800 900 604800 86400
;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 20 17:00:31 CST 2022
;; MSG SIZE rcvd: 105
59.23.93.134.in-addr.arpa domain name pointer zdv-tb236-27.zdv.uni-mainz.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
59.23.93.134.in-addr.arpa name = zdv-tb236-27.zdv.uni-mainz.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
95.216.158.63 | attackspam | SSH Scan |
2020-03-18 16:13:23 |
118.40.248.20 | attackspambots | SSH Brute Force |
2020-03-18 16:34:24 |
79.137.33.73 | attack | 10 attempts against mh-misc-ban on float |
2020-03-18 16:38:19 |
165.22.254.29 | attack | Automatic report - XMLRPC Attack |
2020-03-18 16:20:18 |
142.93.172.64 | attackbots | Mar 18 07:55:02 ns382633 sshd\[6600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64 user=root Mar 18 07:55:04 ns382633 sshd\[6600\]: Failed password for root from 142.93.172.64 port 33862 ssh2 Mar 18 08:03:19 ns382633 sshd\[8315\]: Invalid user user from 142.93.172.64 port 46122 Mar 18 08:03:19 ns382633 sshd\[8315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64 Mar 18 08:03:21 ns382633 sshd\[8315\]: Failed password for invalid user user from 142.93.172.64 port 46122 ssh2 |
2020-03-18 16:04:29 |
113.175.196.226 | attack | 20/3/17@23:50:51: FAIL: Alarm-Network address from=113.175.196.226 ... |
2020-03-18 15:58:23 |
206.189.24.67 | attackbots | Invalid user admin from 206.189.24.67 port 47482 |
2020-03-18 16:08:43 |
106.54.241.222 | attackspam | Invalid user amandabackup from 106.54.241.222 port 47730 |
2020-03-18 16:12:53 |
185.81.99.206 | attackbotsspam | SSH Brute-Force Attack |
2020-03-18 15:57:31 |
111.77.176.41 | attackspambots | 1,63-00/00 [bc00/m65] PostRequest-Spammer scoring: stockholm |
2020-03-18 16:05:05 |
80.82.64.73 | attack | Fail2Ban Ban Triggered |
2020-03-18 16:38:02 |
45.77.33.232 | attackspam | RDP Bruteforce |
2020-03-18 16:24:47 |
158.140.187.50 | attack | C1,WP GET /wp-login.php |
2020-03-18 16:22:25 |
162.243.129.69 | attack | firewall-block, port(s): 28015/tcp |
2020-03-18 16:37:44 |
107.175.33.240 | attackspambots | Mar 18 07:38:29 web8 sshd\[27137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.33.240 user=root Mar 18 07:38:31 web8 sshd\[27137\]: Failed password for root from 107.175.33.240 port 46900 ssh2 Mar 18 07:46:42 web8 sshd\[31315\]: Invalid user jmiller from 107.175.33.240 Mar 18 07:46:42 web8 sshd\[31315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.33.240 Mar 18 07:46:44 web8 sshd\[31315\]: Failed password for invalid user jmiller from 107.175.33.240 port 54770 ssh2 |
2020-03-18 15:47:38 |