City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.19.219.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.19.219.212. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:19:55 CST 2025
;; MSG SIZE rcvd: 107
Host 212.219.19.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 212.219.19.139.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.39.11.47 | attack | Jun 21 01:08:02 debian-2gb-nbg1-2 kernel: \[14953164.988655\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.39.11.47 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=56145 PROTO=TCP SPT=50744 DPT=35380 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-21 07:36:22 |
| 92.63.197.99 | attackspambots | Multiport scan : 5 ports scanned 18833 18844 18855 18866 18880 |
2020-06-21 07:24:43 |
| 80.82.65.74 | attack | NL_IPV_<177>1592694269 [1:2403444:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 73 [Classification: Misc Attack] [Priority: 2]: |
2020-06-21 07:28:32 |
| 64.227.70.78 | attackbotsspam | Jun 21 00:03:28 debian-2gb-nbg1-2 kernel: \[14949291.220584\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=64.227.70.78 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=13973 PROTO=TCP SPT=47817 DPT=1631 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-21 07:29:13 |
| 173.72.0.68 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 07:20:21 |
| 185.39.11.32 | attackspam | Jun 21 00:50:06 [host] kernel: [9321513.943762] [U Jun 21 00:51:32 [host] kernel: [9321599.618207] [U Jun 21 00:54:47 [host] kernel: [9321794.735732] [U Jun 21 00:55:05 [host] kernel: [9321813.025781] [U Jun 21 01:00:35 [host] kernel: [9322142.102036] [U Jun 21 01:07:58 [host] kernel: [9322585.147450] [U |
2020-06-21 07:19:20 |
| 222.186.173.238 | attackbots | Jun 21 02:29:43 ift sshd\[18776\]: Failed password for root from 222.186.173.238 port 50464 ssh2Jun 21 02:29:47 ift sshd\[18776\]: Failed password for root from 222.186.173.238 port 50464 ssh2Jun 21 02:29:50 ift sshd\[18776\]: Failed password for root from 222.186.173.238 port 50464 ssh2Jun 21 02:30:03 ift sshd\[18808\]: Failed password for root from 222.186.173.238 port 10140 ssh2Jun 21 02:30:07 ift sshd\[18808\]: Failed password for root from 222.186.173.238 port 10140 ssh2 ... |
2020-06-21 07:33:15 |
| 222.186.15.62 | attackspambots | 2020-06-20T23:28:35.391899shield sshd\[12423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root 2020-06-20T23:28:37.606093shield sshd\[12423\]: Failed password for root from 222.186.15.62 port 46175 ssh2 2020-06-20T23:28:40.010853shield sshd\[12423\]: Failed password for root from 222.186.15.62 port 46175 ssh2 2020-06-20T23:28:42.825539shield sshd\[12423\]: Failed password for root from 222.186.15.62 port 46175 ssh2 2020-06-20T23:29:21.642602shield sshd\[12748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root |
2020-06-21 07:33:54 |
| 185.156.73.50 | attack | Multiport scan : 5 ports scanned 18881 19111 19222 19333 19444 |
2020-06-21 07:34:51 |
| 185.175.93.27 | attack | SmallBizIT.US 3 packets to tcp(23131,23133,44229) |
2020-06-21 07:15:53 |
| 185.153.196.225 | attack | RU_RM Engineering LLC_<177>1592695559 [1:2402000:5581] ET DROP Dshield Block Listed Source group 1 [Classification: Misc Attack] [Priority: 2]: |
2020-06-21 07:53:41 |
| 89.248.174.201 | attack | NL_IPV_<177>1592695131 [1:2403468:58145] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 85 [Classification: Misc Attack] [Priority: 2]: |
2020-06-21 07:40:30 |
| 115.178.119.110 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 07:38:12 |
| 67.205.139.74 | attackspambots | Multiport scan 31 ports : 221 3018 4388 4802 4971 6614 7512 8289 10581 11102 12903 13005 13080 13097 14058 14246 17632 18192 18568 19002 19940 20579 23969 24273 24775 25633 25726 26140 29227 29245 32313 |
2020-06-21 07:28:59 |
| 13.249.120.108 | attack | ET INFO TLS Handshake Failure - port: 64353 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 07:49:56 |