City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.131.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.201.131.238. IN A
;; AUTHORITY SECTION:
. 77 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:54:50 CST 2022
;; MSG SIZE rcvd: 108
238.131.201.138.in-addr.arpa domain name pointer bauhaus100.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
238.131.201.138.in-addr.arpa name = bauhaus100.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 144.160.112.15 | attackspambots | AT&T says my account 262863093 has been created and they will be out to setup my DirectTV. Funny I never signed up with AT&T. I guess they are so hard up for business they are just randomly choosing people to give DirectTV to. Lord knows no one in their right mind would purchase it. Whoever the idiot is who is getting DirectTV is paying $180.31 promo a month for it. Hasn't he heard of Sling? |
2020-08-08 22:54:22 |
| 114.33.148.74 | attackbots | Aug 8 14:15:28 debian-2gb-nbg1-2 kernel: \[19147374.678717\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=114.33.148.74 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=46628 PROTO=TCP SPT=4604 DPT=9530 WINDOW=8191 RES=0x00 SYN URGP=0 |
2020-08-08 22:56:10 |
| 128.106.164.38 | attackspambots | Unauthorized connection attempt from IP address 128.106.164.38 on Port 445(SMB) |
2020-08-08 22:43:35 |
| 168.90.65.207 | attackspambots | Unauthorized connection attempt from IP address 168.90.65.207 on Port 445(SMB) |
2020-08-08 22:41:01 |
| 49.149.102.241 | attackspambots | Unauthorized connection attempt from IP address 49.149.102.241 on Port 445(SMB) |
2020-08-08 23:01:04 |
| 114.242.34.166 | attackbotsspam | $f2bV_matches |
2020-08-08 22:30:59 |
| 188.251.142.85 | attack | Aug 8 11:49:15 mout sshd[18128]: Connection closed by authenticating user pi 188.251.142.85 port 59188 [preauth] Aug 8 16:25:13 mout sshd[9240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.251.142.85 user=pi Aug 8 16:25:15 mout sshd[9240]: Failed password for pi from 188.251.142.85 port 56814 ssh2 |
2020-08-08 23:01:26 |
| 13.75.251.44 | attack | port scan and connect, tcp 22 (ssh) |
2020-08-08 22:45:09 |
| 222.186.175.167 | attack | Aug 8 14:27:10 scw-6657dc sshd[26547]: Failed password for root from 222.186.175.167 port 58346 ssh2 Aug 8 14:27:10 scw-6657dc sshd[26547]: Failed password for root from 222.186.175.167 port 58346 ssh2 Aug 8 14:27:13 scw-6657dc sshd[26547]: Failed password for root from 222.186.175.167 port 58346 ssh2 ... |
2020-08-08 22:29:47 |
| 186.88.238.130 | attack | Unauthorized connection attempt from IP address 186.88.238.130 on Port 445(SMB) |
2020-08-08 22:20:23 |
| 85.154.169.56 | attackbots | 20/8/8@08:15:55: FAIL: Alarm-Network address from=85.154.169.56 20/8/8@08:15:55: FAIL: Alarm-Network address from=85.154.169.56 ... |
2020-08-08 22:25:13 |
| 101.68.78.194 | attackspam | Aug 8 12:10:32 plex-server sshd[1392982]: Failed password for root from 101.68.78.194 port 37438 ssh2 Aug 8 12:12:56 plex-server sshd[1393909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.78.194 user=root Aug 8 12:12:58 plex-server sshd[1393909]: Failed password for root from 101.68.78.194 port 44278 ssh2 Aug 8 12:15:37 plex-server sshd[1394928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.78.194 user=root Aug 8 12:15:39 plex-server sshd[1394928]: Failed password for root from 101.68.78.194 port 51110 ssh2 ... |
2020-08-08 22:45:48 |
| 109.244.99.33 | attackbotsspam | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-08-08 22:50:07 |
| 189.126.192.170 | attack | Unauthorized connection attempt from IP address 189.126.192.170 on Port 445(SMB) |
2020-08-08 22:28:20 |
| 113.170.255.221 | attackbots | Unauthorized connection attempt from IP address 113.170.255.221 on Port 445(SMB) |
2020-08-08 22:47:56 |