City: Rostock
Region: Mecklenburg-Vorpommern
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.30.90.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1064
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.30.90.244. IN A
;; AUTHORITY SECTION:
. 382 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400
;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 02:59:45 CST 2019
;; MSG SIZE rcvd: 117
244.90.30.139.in-addr.arpa domain name pointer linozelot.gs.e-technik1.uni-rostock.de.
Server: 100.100.2.136
Address: 100.100.2.136#53
Non-authoritative answer:
244.90.30.139.in-addr.arpa name = linozelot.gs.e-technik1.uni-rostock.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
68.183.193.148 | attackbots | SSH / Telnet Brute Force Attempts on Honeypot |
2020-09-17 09:31:02 |
138.36.200.238 | attackbots | Brute force attempt |
2020-09-17 08:43:18 |
117.35.118.42 | attackspam | Multiple SSH authentication failures from 117.35.118.42 |
2020-09-17 09:23:45 |
200.216.30.196 | attackspambots | IP attempted unauthorised action |
2020-09-17 09:13:05 |
59.120.19.123 | attackspambots | Honeypot attack, port: 445, PTR: 59-120-19-123.HINET-IP.hinet.net. |
2020-09-17 09:31:15 |
185.124.184.234 | attackspambots | Sep 16 23:38:51 mail.srvfarm.net postfix/smtps/smtpd[3722019]: warning: unknown[185.124.184.234]: SASL PLAIN authentication failed: Sep 16 23:38:51 mail.srvfarm.net postfix/smtps/smtpd[3722019]: lost connection after AUTH from unknown[185.124.184.234] Sep 16 23:43:50 mail.srvfarm.net postfix/smtps/smtpd[3725260]: warning: unknown[185.124.184.234]: SASL PLAIN authentication failed: Sep 16 23:43:50 mail.srvfarm.net postfix/smtps/smtpd[3725260]: lost connection after AUTH from unknown[185.124.184.234] Sep 16 23:45:52 mail.srvfarm.net postfix/smtpd[3723957]: warning: unknown[185.124.184.234]: SASL PLAIN authentication failed: |
2020-09-17 08:39:17 |
177.184.6.211 | attackbotsspam | Automatic report - Banned IP Access |
2020-09-17 09:16:09 |
222.186.175.150 | attackbots | SSH-BruteForce |
2020-09-17 09:28:17 |
77.244.214.11 | attack | CMS (WordPress or Joomla) login attempt. |
2020-09-17 09:41:59 |
134.122.72.221 | attackspam | Sep 16 14:42:16 george sshd[6226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.72.221 user=root Sep 16 14:42:19 george sshd[6226]: Failed password for root from 134.122.72.221 port 55244 ssh2 Sep 16 14:46:24 george sshd[6291]: Invalid user rsync from 134.122.72.221 port 38764 Sep 16 14:46:24 george sshd[6291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.72.221 Sep 16 14:46:26 george sshd[6291]: Failed password for invalid user rsync from 134.122.72.221 port 38764 ssh2 ... |
2020-09-17 09:18:23 |
182.242.143.38 | attack | SSH / Telnet Brute Force Attempts on Honeypot |
2020-09-17 09:28:58 |
45.4.168.53 | attackbots | Sep 16 18:06:31 mail.srvfarm.net postfix/smtps/smtpd[3584335]: warning: unknown[45.4.168.53]: SASL PLAIN authentication failed: Sep 16 18:06:32 mail.srvfarm.net postfix/smtps/smtpd[3584335]: lost connection after AUTH from unknown[45.4.168.53] Sep 16 18:15:47 mail.srvfarm.net postfix/smtps/smtpd[3580300]: warning: unknown[45.4.168.53]: SASL PLAIN authentication failed: Sep 16 18:15:47 mail.srvfarm.net postfix/smtps/smtpd[3580300]: lost connection after AUTH from unknown[45.4.168.53] Sep 16 18:16:05 mail.srvfarm.net postfix/smtps/smtpd[3600011]: warning: unknown[45.4.168.53]: SASL PLAIN authentication failed: |
2020-09-17 09:09:57 |
59.144.139.18 | attack | $f2bV_matches |
2020-09-17 09:29:44 |
203.213.66.170 | attackspam | SSH-BruteForce |
2020-09-17 09:32:00 |
116.75.228.7 | attackspambots | Listed on dnsbl-sorbs plus abuseat.org and zen-spamhaus / proto=6 . srcport=42269 . dstport=23 . (1101) |
2020-09-17 08:43:42 |