City: Dortmund
Region: North Rhine-Westphalia
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.2.29.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33333
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.2.29.205. IN A
;; AUTHORITY SECTION:
. 122 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020032301 1800 900 604800 86400
;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 06:19:59 CST 2020
;; MSG SIZE rcvd: 116
Host 205.29.2.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 205.29.2.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
171.238.212.244 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 27-01-2020 09:50:11. |
2020-01-28 01:01:52 |
87.107.66.160 | attackbotsspam | Email rejected due to spam filtering |
2020-01-28 01:00:04 |
94.191.62.172 | attackspambots | Unauthorized connection attempt detected from IP address 94.191.62.172 to port 2220 [J] |
2020-01-28 00:42:43 |
36.81.131.182 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-01-2020 09:50:14. |
2020-01-28 00:57:33 |
80.82.65.82 | attackspam | Jan 27 17:54:28 debian-2gb-nbg1-2 kernel: \[2403337.251857\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.82 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=52135 PROTO=TCP SPT=52033 DPT=8684 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-28 01:17:12 |
112.201.67.156 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 27-01-2020 09:50:10. |
2020-01-28 01:05:18 |
218.92.0.173 | attackspambots | Jan 27 19:38:56 server sshd\[20048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root Jan 27 19:38:58 server sshd\[20048\]: Failed password for root from 218.92.0.173 port 42045 ssh2 Jan 27 19:39:01 server sshd\[20048\]: Failed password for root from 218.92.0.173 port 42045 ssh2 Jan 27 19:39:04 server sshd\[20048\]: Failed password for root from 218.92.0.173 port 42045 ssh2 Jan 27 19:39:08 server sshd\[20048\]: Failed password for root from 218.92.0.173 port 42045 ssh2 ... |
2020-01-28 00:47:02 |
106.54.86.242 | attackspam | Unauthorized connection attempt detected from IP address 106.54.86.242 to port 2220 [J] |
2020-01-28 01:19:52 |
104.168.176.40 | attack | Subject: PURCHASE ORDER Date: 27 Jan 2020 03:00:45 -0800 Message ID: <20200127030045.ECCFCF967DD3C3F7@dragonsourcing.com> Virus/Unauthorized code: >>> Trojan.Gen-SH in '18108029_3X_AR_PA2__UK765C5F3.bat' |
2020-01-28 01:02:08 |
136.233.15.42 | attack | Unauthorized connection attempt from IP address 136.233.15.42 on Port 445(SMB) |
2020-01-28 00:40:38 |
49.234.18.158 | attackbots | Jan 27 13:54:46 ws24vmsma01 sshd[36643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 Jan 27 13:54:48 ws24vmsma01 sshd[36643]: Failed password for invalid user ttt from 49.234.18.158 port 43514 ssh2 ... |
2020-01-28 01:20:18 |
43.250.165.172 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 27-01-2020 09:50:14. |
2020-01-28 00:57:12 |
112.85.42.180 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180 user=root Failed password for root from 112.85.42.180 port 38556 ssh2 Failed password for root from 112.85.42.180 port 38556 ssh2 Failed password for root from 112.85.42.180 port 38556 ssh2 Failed password for root from 112.85.42.180 port 38556 ssh2 |
2020-01-28 00:39:43 |
61.2.213.131 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-01-2020 09:50:15. |
2020-01-28 00:54:56 |
36.76.145.7 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-01-2020 09:50:13. |
2020-01-28 00:58:10 |