City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.38.3.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51657
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.38.3.62. IN A
;; AUTHORITY SECTION:
. 400 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:17:12 CST 2022
;; MSG SIZE rcvd: 104
62.3.38.141.in-addr.arpa domain name pointer www.das-basisdienst.de.
62.3.38.141.in-addr.arpa domain name pointer www.temperatur-monitor.de.
62.3.38.141.in-addr.arpa domain name pointer www.agrarmeteorologie.de.
62.3.38.141.in-addr.arpa domain name pointer rcc.dwd.de.
62.3.38.141.in-addr.arpa domain name pointer rcccm.dwd.de.
62.3.38.141.in-addr.arpa domain name pointer livepreview-das-basisdienst.das-basisdienst.de.
62.3.38.141.in-addr.arpa domain name pointer wetterlexikon.eu.
62.3.38.141.in-addr.arpa domain name pointer das-basisdienst.de.
62.3.38.141.in-addr.arpa domain name pointer uv-index.de.
62.3.38.141.in-addr.arpa domain name pointer www.dwd.de.
62.3.38.141.in-addr.arpa domain name pointer liveprewiev-das-basisdienst.dwd.de.
62.3.38.141.in-addr.arpa domain name pointer dwd.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
62.3.38.141.in-addr.arpa name = rcc.dwd.de.
62.3.38.141.in-addr.arpa name = rcccm.dwd.de.
62.3.38.141.in-addr.arpa name = livepreview-das-basisdienst.das-basisdienst.de.
62.3.38.141.in-addr.arpa name = wetterlexikon.eu.
62.3.38.141.in-addr.arpa name = das-basisdienst.de.
62.3.38.141.in-addr.arpa name = uv-index.de.
62.3.38.141.in-addr.arpa name = www.dwd.de.
62.3.38.141.in-addr.arpa name = liveprewiev-das-basisdienst.dwd.de.
62.3.38.141.in-addr.arpa name = dwd.de.
62.3.38.141.in-addr.arpa name = www.das-basisdienst.de.
62.3.38.141.in-addr.arpa name = www.temperatur-monitor.de.
62.3.38.141.in-addr.arpa name = www.agrarmeteorologie.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
36.83.40.165 | attack | 445/tcp [2019-07-30]1pkt |
2019-07-31 05:46:25 |
122.195.200.14 | attackbots | 2019-07-28 11:33:05 -> 2019-07-30 21:14:00 : 45 login attempts (122.195.200.14) |
2019-07-31 05:38:15 |
190.151.159.71 | attackbotsspam | failed_logins |
2019-07-31 05:54:14 |
112.248.220.33 | attackbots | 52869/tcp [2019-07-30]1pkt |
2019-07-31 05:52:49 |
39.72.189.157 | attackbotsspam | 23/tcp [2019-07-30]1pkt |
2019-07-31 06:14:41 |
173.82.154.45 | attack | B: Abusive content scan (301) |
2019-07-31 05:46:46 |
114.215.190.250 | attack | TCP src-port=42224 dst-port=25 barracuda spam-sorbs (827) |
2019-07-31 06:21:32 |
109.76.31.119 | attack | Spam Timestamp : 30-Jul-19 12:23 _ BlockList Provider combined abuse _ (833) |
2019-07-31 06:07:25 |
115.73.227.186 | attack | Spam Timestamp : 30-Jul-19 12:39 _ BlockList Provider combined abuse _ (843) |
2019-07-31 05:57:06 |
60.221.255.176 | attack | Jul 30 12:48:02 xxxxxxx7446550 sshd[2950]: Address 60.221.255.176 maps to 176.255.221.60.adsl-pool.sx.cn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 30 12:48:02 xxxxxxx7446550 sshd[2950]: Invalid user yan from 60.221.255.176 Jul 30 12:48:02 xxxxxxx7446550 sshd[2950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.221.255.176 Jul 30 12:48:05 xxxxxxx7446550 sshd[2950]: Failed password for invalid user yan from 60.221.255.176 port 2075 ssh2 Jul 30 12:48:05 xxxxxxx7446550 sshd[2952]: Received disconnect from 60.221.255.176: 11: Bye Bye Jul 30 12:59:57 xxxxxxx7446550 sshd[6681]: Address 60.221.255.176 maps to 176.255.221.60.adsl-pool.sx.cn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 30 12:59:57 xxxxxxx7446550 sshd[6681]: Invalid user library from 60.221.255.176 Jul 30 12:59:57 xxxxxxx7446550 sshd[6681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=........ ------------------------------- |
2019-07-31 05:48:21 |
175.23.23.187 | attackbotsspam | 52869/tcp [2019-07-30]1pkt |
2019-07-31 05:58:15 |
91.102.167.204 | attackbotsspam | Jul 30 21:05:26 our-server-hostname postfix/smtpd[15222]: connect from unknown[91.102.167.204] Jul 30 21:05:29 our-server-hostname sqlgrey: grey: new: 91.102.167.204(91.102.167.204), x@x -> x@x Jul x@x Jul x@x Jul x@x Jul 30 21:05:30 our-server-hostname sqlgrey: grey: new: 91.102.167.204(91.102.167.204), x@x -> x@x Jul x@x Jul x@x Jul x@x Jul 30 21:05:31 our-server-hostname postfix/smtpd[15222]: disconnect from unknown[91.102.167.204] Jul 30 21:05:52 our-server-hostname postfix/smtpd[15192]: connect from unknown[91.102.167.204] Jul 30 21:05:53 our-server-hostname sqlgrey: grey: new: 91.102.167.204(91.102.167.204), x@x -> x@x Jul x@x Jul x@x Jul x@x Jul 30 21:05:54 our-server-hostname sqlgrey: grey: new: 91.102.167.204(91.102.167.204), x@x -> x@x Jul x@x Jul x@x Jul x@x Jul 30 21:05:55 our-server-hostname postfix/smtpd[15192]: disconnect from unknown[91.102.167.204] Jul 30 21:10:39 our-server-hostname postfix/smtpd[17494]: connect from unknown[91.102.167.204] Jul x@x Jul........ ------------------------------- |
2019-07-31 06:13:16 |
222.127.108.37 | attackbotsspam | Spam Timestamp : 30-Jul-19 12:32 _ BlockList Provider combined abuse _ (838) |
2019-07-31 06:02:59 |
96.79.239.57 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-31 05:43:08 |
180.126.59.137 | attack | Jul 30 13:42:36 vz239 sshd[20657]: Bad protocol version identification '' from 180.126.59.137 Jul 30 13:42:40 vz239 sshd[20660]: Invalid user osboxes from 180.126.59.137 Jul 30 13:42:41 vz239 sshd[20660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.126.59.137 Jul 30 13:42:43 vz239 sshd[20660]: Failed password for invalid user osboxes from 180.126.59.137 port 44272 ssh2 Jul 30 13:42:43 vz239 sshd[20660]: Connection closed by 180.126.59.137 [preauth] Jul 30 13:42:48 vz239 sshd[20664]: Invalid user support from 180.126.59.137 Jul 30 13:42:48 vz239 sshd[20664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.126.59.137 Jul 30 13:42:50 vz239 sshd[20664]: Failed password for invalid user support from 180.126.59.137 port 46558 ssh2 Jul 30 13:42:51 vz239 sshd[20664]: Connection closed by 180.126.59.137 [preauth] Jul 30 13:42:55 vz239 sshd[20666]: Invalid user NetLinx from 180.126.59.13........ ------------------------------- |
2019-07-31 06:05:42 |