City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.79.10.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.79.10.40. IN A
;; AUTHORITY SECTION:
. 404 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:17:19 CST 2022
;; MSG SIZE rcvd: 105
b';; connection timed out; no servers could be reached
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.10.79.141.in-addr.arpa name = diw.hs-offenburg.de.
40.10.79.141.in-addr.arpa name = ecomarathon.de.
40.10.79.141.in-addr.arpa name = emi.hs-offenburg.de.
40.10.79.141.in-addr.arpa name = etape.hs-offenburg.de.
40.10.79.141.in-addr.arpa name = hochschule-offenburg.de.
40.10.79.141.in-addr.arpa name = hs-offenburg.de.
40.10.79.141.in-addr.arpa name = m.hs-offenburg.de.
40.10.79.141.in-addr.arpa name = mi.hs-offenburg.de.
40.10.79.141.in-addr.arpa name = nasio.de.
40.10.79.141.in-addr.arpa name = ohton-online.de.
40.10.79.141.in-addr.arpa name = rz.hs-offenburg.de.
40.10.79.141.in-addr.arpa name = schluckspecht.net.
40.10.79.141.in-addr.arpa name = studieren-bringts.de.
40.10.79.141.in-addr.arpa name = studinavi.hs-offenburg.de.79.141.in-addr.arpa.
40.10.79.141.in-addr.arpa name = sweaty.hs-offenburg.de.
40.10.79.141.in-addr.arpa name = www.ecomarathon.de.
40.10.79.141.in-addr.arpa name = www.hochschule-offenburg.de.
40.10.79.141.in-addr.arpa name = www.hs-offenburg.de.
40.10.79.141.in-addr.arpa name = z3.hs-offenburg.de.
40.10.79.141.in-addr.arpa name = bw.hs-offenburg.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
170.210.214.50 | attackbots | ssh failed login |
2020-02-13 01:00:43 |
103.76.175.130 | attackspambots | $f2bV_matches |
2020-02-13 01:20:46 |
106.52.115.36 | attack | Feb 12 15:16:37 [host] sshd[30102]: pam_unix(sshd: Feb 12 15:16:39 [host] sshd[30102]: Failed passwor Feb 12 15:19:58 [host] sshd[30130]: pam_unix(sshd: |
2020-02-13 01:29:13 |
202.162.195.206 | attackspambots | DATE:2020-02-12 14:43:45, IP:202.162.195.206, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2020-02-13 01:35:37 |
119.94.102.48 | attackspambots | Lines containing failures of 119.94.102.48 Feb 12 05:26:57 Tosca sshd[15312]: Invalid user thostname0nich from 119.94.102.48 port 37126 Feb 12 05:26:57 Tosca sshd[15312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.94.102.48 Feb 12 05:26:59 Tosca sshd[15312]: Failed password for invalid user thostname0nich from 119.94.102.48 port 37126 ssh2 Feb 12 05:27:00 Tosca sshd[15312]: Connection closed by invalid user thostname0nich 119.94.102.48 port 37126 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=119.94.102.48 |
2020-02-13 01:33:39 |
2.38.16.224 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-13 01:09:54 |
61.244.201.237 | attack | Feb 12 10:44:15 firewall sshd[13117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.244.201.237 Feb 12 10:44:15 firewall sshd[13117]: Invalid user lpwi from 61.244.201.237 Feb 12 10:44:17 firewall sshd[13117]: Failed password for invalid user lpwi from 61.244.201.237 port 39156 ssh2 ... |
2020-02-13 01:10:47 |
182.61.177.109 | attackbotsspam | Feb 12 14:43:23 ks10 sshd[16525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.177.109 Feb 12 14:43:25 ks10 sshd[16525]: Failed password for invalid user stagiaire from 182.61.177.109 port 50690 ssh2 ... |
2020-02-13 01:39:01 |
82.81.199.8 | attackbots | Automatic report - Port Scan Attack |
2020-02-13 01:30:40 |
138.197.147.128 | attack | Feb 12 15:37:07 * sshd[26847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.128 Feb 12 15:37:09 * sshd[26847]: Failed password for invalid user sharyl from 138.197.147.128 port 48610 ssh2 |
2020-02-13 01:31:31 |
113.180.39.157 | attackspam | [Tue Feb 11 03:54:40 2020] [error] [client 113.180.39.157] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): / |
2020-02-13 01:39:38 |
139.155.1.18 | attackspambots | Feb 12 10:48:37 plusreed sshd[19355]: Invalid user usuario from 139.155.1.18 ... |
2020-02-13 01:37:36 |
72.208.216.150 | attack | [Tue Feb 11 23:27:28 2020] [error] [client 72.208.216.150] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): / |
2020-02-13 01:26:50 |
107.189.11.11 | attackbots | scan r |
2020-02-13 01:32:28 |
212.112.97.194 | attackbots | Feb 12 17:54:21 meumeu sshd[15369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.112.97.194 Feb 12 17:54:23 meumeu sshd[15369]: Failed password for invalid user sign from 212.112.97.194 port 59011 ssh2 Feb 12 18:00:14 meumeu sshd[16709]: Failed password for root from 212.112.97.194 port 39120 ssh2 ... |
2020-02-13 01:08:05 |