City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.122.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.226.122.58. IN A
;; AUTHORITY SECTION:
. 230 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400
;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 04:20:00 CST 2022
;; MSG SIZE rcvd: 107
58.122.226.137.in-addr.arpa domain name pointer mdm.stw.rwth-aachen.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
58.122.226.137.in-addr.arpa name = mdm.stw.rwth-aachen.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
202.144.157.70 | attackbots | Unauthorized connection attempt detected from IP address 202.144.157.70 to port 2220 [J] |
2020-01-15 01:22:38 |
112.91.185.78 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-15 01:17:31 |
203.147.69.12 | attackspambots | *Port Scan* detected from 203.147.69.12 (NC/New Caledonia/host-203-147-69-12.h22.canl.nc). 4 hits in the last 15 seconds |
2020-01-15 01:24:55 |
91.98.98.2 | attack | 1579006854 - 01/14/2020 14:00:54 Host: 91.98.98.2/91.98.98.2 Port: 445 TCP Blocked |
2020-01-15 01:21:14 |
117.252.67.188 | attackspam | Jan 14 14:00:23 mail postfix/smtpd\[23530\]: warning: unknown\[117.252.67.188\]: SASL PLAIN authentication failed: Connection lost to authentication server Jan 14 14:00:39 mail postfix/smtpd\[22952\]: warning: unknown\[117.252.67.188\]: SASL PLAIN authentication failed: Connection lost to authentication server Jan 14 14:00:51 mail postfix/smtpd\[23752\]: warning: unknown\[117.252.67.188\]: SASL PLAIN authentication failed: Connection lost to authentication server |
2020-01-15 01:24:00 |
166.62.6.51 | attack | Indian SEO spam - From: Mitali |
2020-01-15 01:03:45 |
222.186.175.220 | attackbots | Jan 14 13:53:48 firewall sshd[8634]: Failed password for root from 222.186.175.220 port 14754 ssh2 Jan 14 13:53:52 firewall sshd[8634]: Failed password for root from 222.186.175.220 port 14754 ssh2 Jan 14 13:53:55 firewall sshd[8634]: Failed password for root from 222.186.175.220 port 14754 ssh2 ... |
2020-01-15 01:06:28 |
117.58.241.164 | attackspambots | Unauthorized connection attempt from IP address 117.58.241.164 on Port 445(SMB) |
2020-01-15 01:22:53 |
112.225.12.200 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-15 01:35:18 |
113.14.159.49 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-15 01:00:26 |
36.69.81.255 | attackspam | Unauthorized connection attempt from IP address 36.69.81.255 on Port 445(SMB) |
2020-01-15 01:00:45 |
80.82.70.239 | attack | " " |
2020-01-15 01:15:32 |
112.241.218.86 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-15 01:31:35 |
51.36.149.102 | attackbots | Unauthorized connection attempt from IP address 51.36.149.102 on Port 445(SMB) |
2020-01-15 01:32:09 |
113.103.199.52 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-15 01:12:55 |