City: Markkleeberg
Region: Sachsen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.18.37.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.18.37.14.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:45:50 CST 2025
;; MSG SIZE  rcvd: 10514.37.18.139.in-addr.arpa domain name pointer gespc168.orientw.uni-leipzig.de.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
14.37.18.139.in-addr.arpa	name = gespc168.orientw.uni-leipzig.de.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 61.177.172.128 | attack | 2020-01-19 09:12:28 -> 2020-01-21 13:03:46 : 24 login attempts (61.177.172.128) | 2020-01-22 06:16:54 | 
| 103.209.147.202 | attack | Jan 21 23:49:41 www sshd\[123543\]: Invalid user dd from 103.209.147.202 Jan 21 23:49:41 www sshd\[123543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.209.147.202 Jan 21 23:49:42 www sshd\[123543\]: Failed password for invalid user dd from 103.209.147.202 port 40376 ssh2 ... | 2020-01-22 06:06:48 | 
| 185.209.0.92 | attack | firewall-block, port(s): 1110/tcp, 3908/tcp | 2020-01-22 05:48:25 | 
| 180.76.135.15 | attackspambots | Unauthorized connection attempt detected from IP address 180.76.135.15 to port 2220 [J] | 2020-01-22 05:51:22 | 
| 116.196.90.254 | attackspambots | 2020-01-21T22:05:34.373002shield sshd\[3690\]: Invalid user cornel from 116.196.90.254 port 41306 2020-01-21T22:05:34.378910shield sshd\[3690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.90.254 2020-01-21T22:05:36.290915shield sshd\[3690\]: Failed password for invalid user cornel from 116.196.90.254 port 41306 ssh2 2020-01-21T22:08:15.184357shield sshd\[4556\]: Invalid user train10 from 116.196.90.254 port 41650 2020-01-21T22:08:15.188013shield sshd\[4556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.90.254 | 2020-01-22 06:12:12 | 
| 123.207.96.242 | attack | Unauthorized connection attempt detected from IP address 123.207.96.242 to port 2220 [J] | 2020-01-22 06:17:22 | 
| 222.186.42.75 | attackbots | Jan 22 04:51:59 itv-usvr-02 sshd[25917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.75 user=root Jan 22 04:52:01 itv-usvr-02 sshd[25917]: Failed password for root from 222.186.42.75 port 20300 ssh2 Jan 22 05:00:46 itv-usvr-02 sshd[25927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.75 user=root Jan 22 05:00:48 itv-usvr-02 sshd[25927]: Failed password for root from 222.186.42.75 port 56557 ssh2 | 2020-01-22 06:14:08 | 
| 222.186.173.183 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183 user=root Failed password for root from 222.186.173.183 port 24938 ssh2 Failed password for root from 222.186.173.183 port 24938 ssh2 Failed password for root from 222.186.173.183 port 24938 ssh2 Failed password for root from 222.186.173.183 port 24938 ssh2 | 2020-01-22 06:11:31 | 
| 176.218.33.119 | attackspam | Jan x@x Jan x@x Jan x@x Jan x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=176.218.33.119 | 2020-01-22 05:57:14 | 
| 177.156.106.182 | attackbotsspam | Unauthorized connection attempt from IP address 177.156.106.182 on Port 445(SMB) | 2020-01-22 06:07:43 | 
| 182.74.149.102 | attack | Unauthorized connection attempt from IP address 182.74.149.102 on Port 445(SMB) | 2020-01-22 06:13:22 | 
| 222.186.169.192 | attackspam | Jan 21 22:45:30 MK-Soft-VM4 sshd[15816]: Failed password for root from 222.186.169.192 port 22598 ssh2 Jan 21 22:45:34 MK-Soft-VM4 sshd[15816]: Failed password for root from 222.186.169.192 port 22598 ssh2 ... | 2020-01-22 05:47:01 | 
| 181.211.244.253 | attack | Unauthorized connection attempt from IP address 181.211.244.253 on Port 445(SMB) | 2020-01-22 06:05:35 | 
| 190.47.71.41 | attackspam | Unauthorized connection attempt detected from IP address 190.47.71.41 to port 2220 [J] | 2020-01-22 05:47:24 | 
| 182.46.100.74 | attackspambots | 2020-01-21 dovecot_login authenticator failed for \(FGpAda9Qm0\) \[182.46.100.74\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl\) 2020-01-21 dovecot_login authenticator failed for \(ldoYwgAu34\) \[182.46.100.74\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl\) 2020-01-21 dovecot_login authenticator failed for \(hwS2jdT\) \[182.46.100.74\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl\) | 2020-01-22 05:48:00 |