City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.212.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.226.212.21.			IN	A
;; AUTHORITY SECTION:
.			200	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 21:13:20 CST 2022
;; MSG SIZE  rcvd: 10721.212.226.137.in-addr.arpa domain name pointer smaragd.ikv.rwth-aachen.de.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
21.212.226.137.in-addr.arpa	name = smaragd.ikv.rwth-aachen.de.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 222.186.30.76 | attackbotsspam | 2020-2-6 8:42:44 AM: failed ssh attempt | 2020-02-06 15:45:59 | 
| 157.245.64.140 | attackbotsspam | Feb 6 05:52:30 silence02 sshd[12964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.64.140 Feb 6 05:52:31 silence02 sshd[12964]: Failed password for invalid user hpj from 157.245.64.140 port 50884 ssh2 Feb 6 05:55:25 silence02 sshd[13177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.64.140 | 2020-02-06 15:28:39 | 
| 192.241.237.193 | attackspam | *Port Scan* detected from 192.241.237.193 (US/United States/zg-0131a-80.stretchoid.com). 4 hits in the last 255 seconds | 2020-02-06 15:58:21 | 
| 189.123.42.65 | attack | Lines containing failures of 189.123.42.65 Feb 6 06:05:12 dns01 sshd[22742]: Invalid user admin from 189.123.42.65 port 52989 Feb 6 06:05:12 dns01 sshd[22742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.123.42.65 Feb 6 06:05:15 dns01 sshd[22742]: Failed password for invalid user admin from 189.123.42.65 port 52989 ssh2 Feb 6 06:05:15 dns01 sshd[22742]: Connection closed by invalid user admin 189.123.42.65 port 52989 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=189.123.42.65 | 2020-02-06 15:20:50 | 
| 202.255.199.4 | attack | SSH login attempts with user root at 2020-02-05. | 2020-02-06 15:41:22 | 
| 207.154.229.50 | attackspam | SSH Brute-Forcing (server2) | 2020-02-06 15:28:04 | 
| 216.218.206.66 | attackbotsspam | Unauthorized connection attempt detected from IP address 216.218.206.66 to port 443 [J] | 2020-02-06 15:57:33 | 
| 192.3.8.1 | attackbots | web Attack on Website at 2020-02-05. | 2020-02-06 15:59:57 | 
| 191.242.162.2 | attackspambots | web Attack on Wordpress site at 2020-02-05. | 2020-02-06 16:01:26 | 
| 196.52.43.8 | attackbotsspam | web Attack on Website at 2020-02-05. | 2020-02-06 15:50:33 | 
| 203.189.152.2 | attackspambots | web Attack on Wordpress site at 2020-02-05. | 2020-02-06 15:38:15 | 
| 210.179.126.1 | attackbotsspam | SSH login attempts with user root at 2020-02-05. | 2020-02-06 15:34:05 | 
| 222.186.15.1 | attackspam | SSH login attempts with user root at 2020-02-05. | 2020-02-06 15:23:48 | 
| 142.93.181.214 | attack | Feb 6 02:55:11 firewall sshd[29579]: Invalid user lqk from 142.93.181.214 Feb 6 02:55:13 firewall sshd[29579]: Failed password for invalid user lqk from 142.93.181.214 port 46140 ssh2 Feb 6 02:58:07 firewall sshd[29707]: Invalid user otm from 142.93.181.214 ... | 2020-02-06 15:58:41 | 
| 200.96.49.7 | attackbotsspam | SSH login attempts with user root at 2020-02-05. | 2020-02-06 15:47:15 |