City: Graz
Region: Steiermark
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.50.29.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;143.50.29.38. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 08:19:37 CST 2025
;; MSG SIZE rcvd: 105
38.29.50.143.in-addr.arpa domain name pointer GEOL38.UNI-GRAZ.AT.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
38.29.50.143.in-addr.arpa name = GEOL38.UNI-GRAZ.AT.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.76.167.221 | attackspam | Apr 6 02:38:25 php1 sshd\[18870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.167.221 user=root Apr 6 02:38:28 php1 sshd\[18870\]: Failed password for root from 180.76.167.221 port 56616 ssh2 Apr 6 02:42:22 php1 sshd\[19389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.167.221 user=root Apr 6 02:42:24 php1 sshd\[19389\]: Failed password for root from 180.76.167.221 port 55972 ssh2 Apr 6 02:45:57 php1 sshd\[19730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.167.221 user=root |
2020-04-06 20:55:17 |
| 112.222.179.212 | attackspam | [ssh] SSH attack |
2020-04-06 20:44:07 |
| 47.91.130.111 | attack | User locked out |
2020-04-06 20:53:53 |
| 61.227.178.227 | attack | Unauthorized connection attempt from IP address 61.227.178.227 on Port 445(SMB) |
2020-04-06 21:02:42 |
| 46.172.66.30 | attackspambots | Unauthorized connection attempt from IP address 46.172.66.30 on Port 445(SMB) |
2020-04-06 21:13:39 |
| 58.152.43.8 | attack | Apr 6 06:02:53 vlre-nyc-1 sshd\[10090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.152.43.8 user=root Apr 6 06:02:55 vlre-nyc-1 sshd\[10090\]: Failed password for root from 58.152.43.8 port 15666 ssh2 Apr 6 06:08:20 vlre-nyc-1 sshd\[10247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.152.43.8 user=root Apr 6 06:08:22 vlre-nyc-1 sshd\[10247\]: Failed password for root from 58.152.43.8 port 60590 ssh2 Apr 6 06:11:44 vlre-nyc-1 sshd\[10338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.152.43.8 user=root ... |
2020-04-06 20:35:29 |
| 211.5.228.19 | attack | 2020-04-06 14:50:44,963 fail2ban.actions: WARNING [ssh] Ban 211.5.228.19 |
2020-04-06 21:15:21 |
| 106.13.78.137 | attackspambots | Apr 6 12:40:45 marvibiene sshd[50380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.137 user=root Apr 6 12:40:47 marvibiene sshd[50380]: Failed password for root from 106.13.78.137 port 47343 ssh2 Apr 6 12:45:58 marvibiene sshd[50462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.137 user=root Apr 6 12:46:00 marvibiene sshd[50462]: Failed password for root from 106.13.78.137 port 36730 ssh2 ... |
2020-04-06 20:52:01 |
| 98.110.74.69 | attackspam | Apr 6 08:49:33 ny01 sshd[26078]: Failed password for root from 98.110.74.69 port 45582 ssh2 Apr 6 08:53:09 ny01 sshd[26556]: Failed password for root from 98.110.74.69 port 53826 ssh2 |
2020-04-06 21:05:56 |
| 117.4.50.68 | attack | 20/4/6@08:45:42: FAIL: Alarm-Network address from=117.4.50.68 ... |
2020-04-06 21:16:42 |
| 148.251.9.145 | attackbots | 20 attempts against mh-misbehave-ban on pluto |
2020-04-06 20:40:10 |
| 187.65.164.199 | attack | Lines containing failures of 187.65.164.199 Apr 6 06:55:24 shared06 sshd[17232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.65.164.199 user=r.r Apr 6 06:55:26 shared06 sshd[17232]: Failed password for r.r from 187.65.164.199 port 35104 ssh2 Apr 6 06:55:26 shared06 sshd[17232]: Received disconnect from 187.65.164.199 port 35104:11: Bye Bye [preauth] Apr 6 06:55:26 shared06 sshd[17232]: Disconnected from authenticating user r.r 187.65.164.199 port 35104 [preauth] Apr 6 07:12:45 shared06 sshd[22494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.65.164.199 user=r.r Apr 6 07:12:47 shared06 sshd[22494]: Failed password for r.r from 187.65.164.199 port 49232 ssh2 Apr 6 07:12:47 shared06 sshd[22494]: Received disconnect from 187.65.164.199 port 49232:11: Bye Bye [preauth] Apr 6 07:12:47 shared06 sshd[22494]: Disconnected from authenticating user r.r 187.65.164.199 port 49232........ ------------------------------ |
2020-04-06 20:51:15 |
| 89.248.172.85 | attackbots | scans 7 times in preceeding hours on the ports (in chronological order) 1045 1490 6660 1033 1499 5505 5454 resulting in total of 99 scans from 89.248.160.0-89.248.174.255 block. |
2020-04-06 21:07:29 |
| 111.229.199.67 | attackbotsspam | Apr 6 13:36:15 ns382633 sshd\[29269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.199.67 user=root Apr 6 13:36:17 ns382633 sshd\[29269\]: Failed password for root from 111.229.199.67 port 43314 ssh2 Apr 6 13:54:52 ns382633 sshd\[573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.199.67 user=root Apr 6 13:54:53 ns382633 sshd\[573\]: Failed password for root from 111.229.199.67 port 44962 ssh2 Apr 6 13:59:36 ns382633 sshd\[1694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.199.67 user=root |
2020-04-06 20:37:46 |
| 115.134.34.23 | attackbotsspam | port scan and connect, tcp 80 (http) |
2020-04-06 21:09:52 |