City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.13.250.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30037
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.13.250.71. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 13:50:04 CST 2025
;; MSG SIZE rcvd: 106
71.250.13.139.in-addr.arpa domain name pointer glob-ps3.hs-woe.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
71.250.13.139.in-addr.arpa name = glob-ps3.hs-woe.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
218.92.0.173 | attack | 04/14/2020-06:54:38.960953 218.92.0.173 Protocol: 6 ET SCAN Potential SSH Scan |
2020-04-14 19:05:08 |
106.75.4.19 | attack | " " |
2020-04-14 18:44:41 |
101.198.180.207 | attackspam | (sshd) Failed SSH login from 101.198.180.207 (CN/China/-): 5 in the last 3600 secs |
2020-04-14 19:00:41 |
222.187.222.110 | attack | Abuse |
2020-04-14 18:30:16 |
157.245.207.198 | attack | Apr 14 10:16:28 marvibiene sshd[28460]: Invalid user nmis from 157.245.207.198 port 57874 Apr 14 10:16:28 marvibiene sshd[28460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.207.198 Apr 14 10:16:28 marvibiene sshd[28460]: Invalid user nmis from 157.245.207.198 port 57874 Apr 14 10:16:30 marvibiene sshd[28460]: Failed password for invalid user nmis from 157.245.207.198 port 57874 ssh2 ... |
2020-04-14 18:55:23 |
113.65.129.162 | attackbotsspam | Apr 13 11:11:52 ns4 sshd[23911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.65.129.162 user=r.r Apr 13 11:11:54 ns4 sshd[23911]: Failed password for r.r from 113.65.129.162 port 53624 ssh2 Apr 13 11:20:48 ns4 sshd[25755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.65.129.162 user=r.r Apr 13 11:20:50 ns4 sshd[25755]: Failed password for r.r from 113.65.129.162 port 53408 ssh2 Apr 13 11:24:36 ns4 sshd[26570]: Invalid user www from 113.65.129.162 Apr 13 11:24:36 ns4 sshd[26570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.65.129.162 Apr 13 11:24:39 ns4 sshd[26570]: Failed password for invalid user www from 113.65.129.162 port 54447 ssh2 Apr 13 11:27:55 ns4 sshd[27370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.65.129.162 user=r.r Apr 13 11:27:56 ns4 sshd[27370]: Failed passwor........ ------------------------------- |
2020-04-14 18:41:23 |
188.162.132.178 | attack | Unauthorized connection attempt from IP address 188.162.132.178 on Port 445(SMB) |
2020-04-14 19:10:34 |
103.52.217.89 | attackspambots | Unauthorized connection attempt detected from IP address 103.52.217.89 to port 3531 |
2020-04-14 18:46:51 |
187.45.103.15 | attack | $f2bV_matches |
2020-04-14 18:34:53 |
111.229.3.209 | attackspambots | Apr 14 01:53:35 ny01 sshd[23346]: Failed password for root from 111.229.3.209 port 43170 ssh2 Apr 14 01:58:31 ny01 sshd[24428]: Failed password for bin from 111.229.3.209 port 41424 ssh2 |
2020-04-14 18:40:04 |
104.238.94.60 | attack | 104.238.94.60 - - [14/Apr/2020:06:36:49 +0200] "POST /wp-login.php HTTP/1.0" 200 2504 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 104.238.94.60 - - [14/Apr/2020:06:36:51 +0200] "POST /wp-login.php HTTP/1.0" 200 2485 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-04-14 18:56:05 |
220.178.75.153 | attackbotsspam | " " |
2020-04-14 18:34:02 |
14.234.27.46 | attackbotsspam | Unauthorized connection attempt from IP address 14.234.27.46 on Port 445(SMB) |
2020-04-14 18:56:25 |
113.176.70.141 | attackbots | Icarus honeypot on github |
2020-04-14 18:44:12 |
222.186.42.137 | attack | Unauthorized connection attempt detected from IP address 222.186.42.137 to port 22 [T] |
2020-04-14 18:58:38 |