City: Falkenstein
Region: Sachsen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.214.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.201.214.120. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025050601 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 06 20:59:16 CST 2025
;; MSG SIZE rcvd: 108
120.214.201.138.in-addr.arpa domain name pointer static.120.214.201.138.clients.your-server.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
120.214.201.138.in-addr.arpa name = static.120.214.201.138.clients.your-server.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
194.186.22.162 | attackspam | Unauthorized connection attempt detected from IP address 194.186.22.162 to port 2220 [J] |
2020-02-03 10:35:36 |
125.167.95.191 | attackspambots | Unauthorized connection attempt detected from IP address 125.167.95.191 to port 445 |
2020-02-03 10:43:56 |
203.83.162.69 | attack | Email IMAP login failure |
2020-02-03 10:37:24 |
181.16.167.19 | attackbots | Unauthorized connection attempt detected from IP address 181.16.167.19 to port 2220 [J] |
2020-02-03 10:47:01 |
198.98.61.24 | attackspambots | IP attempted unauthorised action |
2020-02-03 10:46:08 |
35.240.190.190 | attackbots | WordPress login Brute force / Web App Attack on client site. |
2020-02-03 10:21:09 |
195.3.146.88 | attackspam | Port scan: Attack repeated for 24 hours |
2020-02-03 13:00:51 |
65.191.76.227 | attackbotsspam | Unauthorized connection attempt detected from IP address 65.191.76.227 to port 2220 [J] |
2020-02-03 10:52:29 |
3.89.247.66 | attackbots | Unauthorized connection attempt detected from IP address 3.89.247.66 to port 443 [J] |
2020-02-03 10:22:27 |
223.197.151.55 | attackbots | Feb 3 02:17:18 srv01 sshd[1243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.151.55 user=root Feb 3 02:17:20 srv01 sshd[1243]: Failed password for root from 223.197.151.55 port 38390 ssh2 Feb 3 02:21:36 srv01 sshd[1693]: Invalid user alixia from 223.197.151.55 port 46016 Feb 3 02:21:36 srv01 sshd[1693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.151.55 Feb 3 02:21:36 srv01 sshd[1693]: Invalid user alixia from 223.197.151.55 port 46016 Feb 3 02:21:38 srv01 sshd[1693]: Failed password for invalid user alixia from 223.197.151.55 port 46016 ssh2 ... |
2020-02-03 10:34:37 |
222.186.173.226 | attackbots | Feb 2 18:54:49 hpm sshd\[19224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226 user=root Feb 2 18:54:50 hpm sshd\[19224\]: Failed password for root from 222.186.173.226 port 36686 ssh2 Feb 2 18:55:05 hpm sshd\[19224\]: Failed password for root from 222.186.173.226 port 36686 ssh2 Feb 2 18:55:08 hpm sshd\[19237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226 user=root Feb 2 18:55:10 hpm sshd\[19237\]: Failed password for root from 222.186.173.226 port 17097 ssh2 |
2020-02-03 13:05:21 |
202.5.16.75 | attack | Feb 3 02:28:58 pornomens sshd\[15367\]: Invalid user woodie from 202.5.16.75 port 45430 Feb 3 02:28:58 pornomens sshd\[15367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.5.16.75 Feb 3 02:28:59 pornomens sshd\[15367\]: Failed password for invalid user woodie from 202.5.16.75 port 45430 ssh2 ... |
2020-02-03 10:22:49 |
200.27.172.196 | attackbotsspam | POST /Appdc45c98a.php HTTP/1.1 404 10082 Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 |
2020-02-03 13:06:40 |
81.250.128.69 | attackspam | Jan 28 17:18:48 emma postfix/smtpd[21104]: connect from lneuilly-657-1-1-69.w81-250.abo.wanadoo.fr[81.250.128.69] Jan x@x Jan 28 17:18:49 emma postfix/smtpd[21104]: disconnect from lneuilly-657-1-1-69.w81-250.abo.wanadoo.fr[81.250.128.69] Jan 28 17:23:51 emma postfix/smtpd[21245]: connect from lneuilly-657-1-1-69.w81-250.abo.wanadoo.fr[81.250.128.69] Jan x@x Jan 28 17:23:51 emma postfix/smtpd[21245]: disconnect from lneuilly-657-1-1-69.w81-250.abo.wanadoo.fr[81.250.128.69] Jan 28 17:28:52 emma postfix/smtpd[21444]: connect from lneuilly-657-1-1-69.w81-250.abo.wanadoo.fr[81.250.128.69] Jan x@x Jan 28 17:28:52 emma postfix/smtpd[21444]: disconnect from lneuilly-657-1-1-69.w81-250.abo.wanadoo.fr[81.250.128.69] Jan 28 17:33:55 emma postfix/smtpd[22174]: connect from lneuilly-657-1-1-69.w81-250.abo.wanadoo.fr[81.250.128.69] Jan x@x Jan 28 17:33:56 emma postfix/smtpd[22174]: disconnect from lneuilly-657-1-1-69.w81-250.abo.wanadoo.fr[81.250.128.69] Jan 28 17:38:58 emma postfix........ ------------------------------- |
2020-02-03 10:36:54 |
157.230.251.115 | attackspam | Unauthorized connection attempt detected from IP address 157.230.251.115 to port 2220 [J] |
2020-02-03 10:36:34 |