City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.164.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.226.164.66. IN A
;; AUTHORITY SECTION:
. 503 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061200 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 00:55:46 CST 2022
;; MSG SIZE rcvd: 107
66.164.226.137.in-addr.arpa domain name pointer bartkauz.lih.rwth-aachen.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.164.226.137.in-addr.arpa name = bartkauz.lih.rwth-aachen.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
181.196.177.20 | attackspambots | Unauthorized connection attempt from IP address 181.196.177.20 on Port 445(SMB) |
2019-11-28 06:33:33 |
188.19.184.59 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-28 06:52:00 |
117.3.70.114 | attackspambots | Unauthorized connection attempt from IP address 117.3.70.114 on Port 445(SMB) |
2019-11-28 06:47:32 |
182.73.48.150 | attack | Unauthorized connection attempt from IP address 182.73.48.150 on Port 445(SMB) |
2019-11-28 06:28:22 |
49.88.112.68 | attackspam | Nov 28 00:43:47 sauna sshd[57021]: Failed password for root from 49.88.112.68 port 38338 ssh2 ... |
2019-11-28 06:53:38 |
118.112.69.35 | attackspambots | Unauthorized connection attempt from IP address 118.112.69.35 on Port 445(SMB) |
2019-11-28 06:41:01 |
69.85.70.44 | attack | Nov 27 20:11:44 fr01 sshd[27752]: Invalid user marieeliza from 69.85.70.44 ... |
2019-11-28 06:31:04 |
5.189.141.4 | attackbotsspam | [portscan] Port scan |
2019-11-28 06:56:59 |
14.186.30.140 | attackbots | $f2bV_matches |
2019-11-28 06:47:11 |
89.240.226.216 | attackspambots | UTC: 2019-11-26 port: 23/tcp |
2019-11-28 06:39:09 |
102.114.176.79 | attackbotsspam | SSH auth scanning - multiple failed logins |
2019-11-28 06:26:23 |
188.92.77.235 | attack | firewall-block, port(s): 1900/udp |
2019-11-28 06:40:39 |
211.211.135.64 | attackbotsspam | Fail2Ban Ban Triggered |
2019-11-28 06:25:18 |
113.141.70.119 | attackspam | Unauthorised access (Nov 27) SRC=113.141.70.119 LEN=40 TTL=239 ID=10096 TCP DPT=445 WINDOW=1024 SYN |
2019-11-28 06:44:00 |
80.211.249.177 | attackbots | Nov 27 16:29:33 ns37 sshd[9941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.249.177 |
2019-11-28 06:30:38 |