City: Aachen
Region: North Rhine-Westphalia
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.140.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.226.140.134. IN A
;; AUTHORITY SECTION:
. 241 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400
;; Query time: 407 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 10:09:45 CST 2022
;; MSG SIZE rcvd: 108
134.140.226.137.in-addr.arpa domain name pointer nat-134-140.weh.rwth-aachen.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.140.226.137.in-addr.arpa name = nat-134-140.weh.rwth-aachen.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
179.127.198.154 | attackspambots | Unauthorized connection attempt from IP address 179.127.198.154 on Port 445(SMB) |
2019-11-29 04:07:02 |
94.25.224.222 | attack | Unauthorized connection attempt from IP address 94.25.224.222 on Port 445(SMB) |
2019-11-29 03:59:19 |
78.187.93.89 | attack | firewall-block, port(s): 23/tcp |
2019-11-29 04:03:46 |
42.104.97.238 | attackspam | 2019-11-27 08:34:40 server sshd[3483]: Failed password for invalid user mail from 42.104.97.238 port 28009 ssh2 |
2019-11-29 03:39:48 |
191.9.240.42 | attackspambots | Nov 28 14:30:45 work-partkepr sshd\[24688\]: Invalid user admin from 191.9.240.42 port 37353 Nov 28 14:30:45 work-partkepr sshd\[24688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.9.240.42 ... |
2019-11-29 03:43:47 |
200.246.161.130 | attack | Unauthorized connection attempt from IP address 200.246.161.130 on Port 445(SMB) |
2019-11-29 03:43:30 |
125.26.165.10 | attack | Unauthorized connection attempt from IP address 125.26.165.10 on Port 445(SMB) |
2019-11-29 03:55:05 |
109.228.191.133 | attackbotsspam | 2019-11-26 04:24:46 server sshd[72885]: Failed password for invalid user test from 109.228.191.133 port 24543 ssh2 |
2019-11-29 04:07:53 |
2001:41d0:403:1d0:: | attack | xmlrpc attack |
2019-11-29 03:57:25 |
222.186.175.167 | attackbotsspam | 2019-11-28T21:08:36.858707scmdmz1 sshd\[12888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root 2019-11-28T21:08:38.033804scmdmz1 sshd\[12888\]: Failed password for root from 222.186.175.167 port 53742 ssh2 2019-11-28T21:08:41.187331scmdmz1 sshd\[12888\]: Failed password for root from 222.186.175.167 port 53742 ssh2 ... |
2019-11-29 04:09:46 |
85.105.16.233 | attackbotsspam | Unauthorized connection attempt from IP address 85.105.16.233 on Port 445(SMB) |
2019-11-29 03:58:57 |
221.133.61.106 | attackspam | Nov 28 09:17:38 php1 sshd\[25456\]: Invalid user named from 221.133.61.106 Nov 28 09:17:38 php1 sshd\[25456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.133.61.106 Nov 28 09:17:40 php1 sshd\[25456\]: Failed password for invalid user named from 221.133.61.106 port 34357 ssh2 Nov 28 09:23:33 php1 sshd\[26130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.133.61.106 user=root Nov 28 09:23:35 php1 sshd\[26130\]: Failed password for root from 221.133.61.106 port 36708 ssh2 |
2019-11-29 03:40:45 |
46.229.168.140 | attack | 404 NOT FOUND |
2019-11-29 04:04:03 |
45.113.155.133 | attackbots | Unauthorized connection attempt from IP address 45.113.155.133 on Port 445(SMB) |
2019-11-29 04:05:08 |
184.105.139.113 | attackspambots | Unauthorised access (Nov 28) SRC=184.105.139.113 LEN=40 TTL=241 ID=54321 TCP DPT=8080 WINDOW=65535 SYN |
2019-11-29 03:44:14 |