City: Graz
Region: Styria
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: Universitaet Graz
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.50.127.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19093
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;143.50.127.17. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072001 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 21 03:26:47 CST 2019
;; MSG SIZE rcvd: 117
17.127.50.143.in-addr.arpa domain name pointer SLSO127017.UNI-GRAZ.AT.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
17.127.50.143.in-addr.arpa name = SLSO127017.UNI-GRAZ.AT.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
178.62.90.225 | attack | Invalid user e from 178.62.90.225 port 40426 |
2020-03-11 17:13:52 |
111.229.78.199 | attackspam | Invalid user maxwell from 111.229.78.199 port 57290 |
2020-03-11 16:54:53 |
82.148.19.128 | attackbots | Invalid user admin from 82.148.19.128 port 55770 |
2020-03-11 16:39:10 |
47.44.215.186 | attackspambots | (sshd) Failed SSH login from 47.44.215.186 (US/United States/47-44-215-186.static.unas.mo.charter.com): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 11 09:18:01 ubnt-55d23 sshd[24042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.44.215.186 user=root Mar 11 09:18:02 ubnt-55d23 sshd[24042]: Failed password for root from 47.44.215.186 port 20001 ssh2 |
2020-03-11 17:04:13 |
106.13.90.78 | attackbotsspam | Invalid user bot from 106.13.90.78 port 55608 |
2020-03-11 16:57:08 |
161.49.160.8 | attackspam | Invalid user user1 from 161.49.160.8 port 61869 |
2020-03-11 16:49:09 |
128.199.204.164 | attack | Mar 11 09:14:20 MainVPS sshd[19543]: Invalid user bitbucket from 128.199.204.164 port 37114 Mar 11 09:14:20 MainVPS sshd[19543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.164 Mar 11 09:14:20 MainVPS sshd[19543]: Invalid user bitbucket from 128.199.204.164 port 37114 Mar 11 09:14:22 MainVPS sshd[19543]: Failed password for invalid user bitbucket from 128.199.204.164 port 37114 ssh2 Mar 11 09:20:48 MainVPS sshd[32267]: Invalid user javier from 128.199.204.164 port 48540 ... |
2020-03-11 16:51:00 |
65.97.0.208 | attackbotsspam | $f2bV_matches |
2020-03-11 17:02:30 |
121.160.189.214 | attack | Invalid user test from 121.160.189.214 port 48584 |
2020-03-11 16:53:00 |
139.162.168.14 | attack | Invalid user linuxacademy from 139.162.168.14 port 45942 |
2020-03-11 17:18:01 |
106.54.114.248 | attack | Invalid user infowarelab from 106.54.114.248 port 43364 |
2020-03-11 16:56:24 |
110.49.6.226 | attackbots | Invalid user odoo from 110.49.6.226 port 41322 |
2020-03-11 16:55:22 |
222.84.254.88 | attack | Invalid user guozp from 222.84.254.88 port 32968 |
2020-03-11 17:07:02 |
14.136.204.41 | attackbots | Invalid user postgres from 14.136.204.41 port 37876 |
2020-03-11 16:40:28 |
82.212.60.75 | attackbotsspam | Invalid user ftpuser from 82.212.60.75 port 34558 |
2020-03-11 17:00:37 |