City: unknown
Region: unknown
Country: Turkey
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.98.205.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5277
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.98.205.242. IN A
;; AUTHORITY SECTION:
. 224 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:18:33 CST 2022
;; MSG SIZE rcvd: 107
242.205.98.141.in-addr.arpa domain name pointer srv.ginasoft.org.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.205.98.141.in-addr.arpa name = srv.ginasoft.org.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
82.252.129.36 | attackspambots | 2019-12-07T17:30:48.085Z CLOSE host=82.252.129.36 port=53288 fd=4 time=20.003 bytes=27 ... |
2020-03-13 01:06:46 |
114.234.30.33 | attackbotsspam | Spammer |
2020-03-13 00:55:46 |
178.171.116.198 | attackbots | Chat Spam |
2020-03-13 01:23:26 |
122.162.255.119 | attack | 1584016184 - 03/12/2020 13:29:44 Host: 122.162.255.119/122.162.255.119 Port: 445 TCP Blocked |
2020-03-13 01:37:13 |
45.116.113.114 | attackspam | Port scan on 1 port(s): 8291 |
2020-03-13 01:11:58 |
79.143.44.250 | attack | 2019-12-12T01:04:51.788Z CLOSE host=79.143.44.250 port=59898 fd=4 time=20.014 bytes=29 ... |
2020-03-13 01:24:31 |
46.101.105.55 | attack | Mar 12 17:40:20 vserver sshd\[22343\]: Failed password for root from 46.101.105.55 port 56630 ssh2Mar 12 17:43:58 vserver sshd\[22361\]: Failed password for root from 46.101.105.55 port 44436 ssh2Mar 12 17:47:34 vserver sshd\[22397\]: Invalid user rust from 46.101.105.55Mar 12 17:47:36 vserver sshd\[22397\]: Failed password for invalid user rust from 46.101.105.55 port 60490 ssh2 ... |
2020-03-13 00:50:37 |
78.47.15.166 | attackspam | 2020-02-18T08:09:47.749Z CLOSE host=78.47.15.166 port=37414 fd=5 time=20.006 bytes=18 ... |
2020-03-13 01:31:27 |
106.75.240.180 | attack | Mar 12 23:37:21 lcl-usvr-02 sshd[7178]: Invalid user user13 from 106.75.240.180 port 56118 Mar 12 23:37:21 lcl-usvr-02 sshd[7178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.240.180 Mar 12 23:37:21 lcl-usvr-02 sshd[7178]: Invalid user user13 from 106.75.240.180 port 56118 Mar 12 23:37:23 lcl-usvr-02 sshd[7178]: Failed password for invalid user user13 from 106.75.240.180 port 56118 ssh2 Mar 12 23:46:24 lcl-usvr-02 sshd[7289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.240.180 user=root Mar 12 23:46:26 lcl-usvr-02 sshd[7289]: Failed password for root from 106.75.240.180 port 59030 ssh2 ... |
2020-03-13 00:56:11 |
82.162.3.184 | attack | 2020-02-06T08:41:58.972Z CLOSE host=82.162.3.184 port=60422 fd=4 time=20.010 bytes=24 ... |
2020-03-13 01:09:44 |
81.133.226.101 | attackspambots | 2020-01-05T03:54:15.180Z CLOSE host=81.133.226.101 port=6409 fd=4 time=20.020 bytes=16 ... |
2020-03-13 01:13:14 |
80.241.209.235 | attackbotsspam | Mar 12 16:44:37 src: 80.241.209.235 signature match: "BACKDOOR RUX the Tick connection attempt" (sid: 100063) tcp port: 22222 |
2020-03-13 01:16:40 |
113.183.5.167 | attackbotsspam | suspicious action Thu, 12 Mar 2020 09:29:51 -0300 |
2020-03-13 01:18:38 |
91.194.91.202 | attackbots | Automatically reported by fail2ban report script (mx1) |
2020-03-13 01:19:38 |
78.72.147.155 | attack | 2020-01-06T20:57:52.116Z CLOSE host=78.72.147.155 port=38494 fd=4 time=40.031 bytes=51 ... |
2020-03-13 01:28:43 |