City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.203.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.226.203.21. IN A
;; AUTHORITY SECTION:
. 485 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062600 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 23:09:30 CST 2022
;; MSG SIZE rcvd: 107
21.203.226.137.in-addr.arpa domain name pointer pruefung.medien.rwth-aachen.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.203.226.137.in-addr.arpa name = pruefung.medien.rwth-aachen.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
125.254.54.105 | attackspambots | 445/tcp 445/tcp [2019-05-15/06-25]2pkt |
2019-06-26 06:20:41 |
63.143.52.86 | attackbotsspam | Unauthorized connection attempt from IP address 63.143.52.86 on Port 445(SMB) |
2019-06-26 06:43:18 |
194.204.214.167 | attackspam | 445/tcp 445/tcp 445/tcp... [2019-04-29/06-25]20pkt,1pt.(tcp) |
2019-06-26 06:46:46 |
102.165.37.212 | attack | Invalid user dei from 102.165.37.212 port 46724 |
2019-06-26 06:35:47 |
45.13.39.56 | attackbots | Jun 26 00:09:13 mail postfix/smtpd\[5400\]: warning: unknown\[45.13.39.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 26 00:10:18 mail postfix/smtpd\[5400\]: warning: unknown\[45.13.39.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 26 00:11:21 mail postfix/smtpd\[5400\]: warning: unknown\[45.13.39.56\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-06-26 06:17:29 |
94.99.97.185 | attackbots | Spam Timestamp : 25-Jun-19 17:47 _ BlockList Provider combined abuse _ (1230) |
2019-06-26 06:46:13 |
202.101.232.120 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-06/06-25]4pkt,1pt.(tcp) |
2019-06-26 06:26:20 |
36.112.130.77 | attack | Jun 25 16:38:02 debian sshd\[14132\]: Invalid user english from 36.112.130.77 port 26238 Jun 25 16:38:02 debian sshd\[14132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.130.77 Jun 25 16:38:04 debian sshd\[14132\]: Failed password for invalid user english from 36.112.130.77 port 26238 ssh2 ... |
2019-06-26 06:24:54 |
185.195.24.60 | attack | /admin/ |
2019-06-26 06:29:32 |
118.163.193.82 | attackspambots | Invalid user ubuntu from 118.163.193.82 port 33369 |
2019-06-26 06:35:16 |
170.84.181.234 | attackspam | Trying to deliver email spam, but blocked by RBL |
2019-06-26 06:11:13 |
181.129.182.42 | attackbotsspam | 445/tcp 445/tcp 445/tcp... [2019-05-16/06-25]4pkt,1pt.(tcp) |
2019-06-26 06:16:39 |
190.145.92.21 | attackbotsspam | 445/tcp 445/tcp 445/tcp... [2019-04-30/06-25]13pkt,1pt.(tcp) |
2019-06-26 06:31:43 |
203.195.177.254 | attackbotsspam | 445/tcp 445/tcp 445/tcp... [2019-04-29/06-25]10pkt,1pt.(tcp) |
2019-06-26 06:21:32 |
123.10.220.211 | attack | 23/tcp 23/tcp [2019-06-20/25]2pkt |
2019-06-26 06:19:49 |