City: unknown
Region: unknown
Country: The Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.96.73.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8167
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.96.73.61. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:24:24 CST 2025
;; MSG SIZE rcvd: 105
61.73.96.145.in-addr.arpa domain name pointer host-61-73.eduroamers.nl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
61.73.96.145.in-addr.arpa name = host-61-73.eduroamers.nl.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
219.133.37.8 | attack | Unauthorised access (Mar 9) SRC=219.133.37.8 LEN=40 TTL=244 ID=30946 TCP DPT=1433 WINDOW=1024 SYN |
2020-03-10 02:12:59 |
197.2.30.111 | attack | Email rejected due to spam filtering |
2020-03-10 02:26:45 |
51.77.203.192 | attackspambots | Lines containing failures of 51.77.203.192 Mar 9 01:19:52 neweola sshd[30055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.203.192 user=r.r Mar 9 01:19:53 neweola sshd[30055]: Failed password for r.r from 51.77.203.192 port 40856 ssh2 Mar 9 01:19:54 neweola sshd[30055]: Received disconnect from 51.77.203.192 port 40856:11: Bye Bye [preauth] Mar 9 01:19:54 neweola sshd[30055]: Disconnected from authenticating user r.r 51.77.203.192 port 40856 [preauth] Mar 9 01:24:29 neweola sshd[30192]: Invalid user sammy from 51.77.203.192 port 59630 Mar 9 01:24:29 neweola sshd[30192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.203.192 Mar 9 01:24:30 neweola sshd[30192]: Failed password for invalid user sammy from 51.77.203.192 port 59630 ssh2 Mar 9 01:24:31 neweola sshd[30192]: Received disconnect from 51.77.203.192 port 59630:11: Bye Bye [preauth] Mar 9 01:24:31 neweola sshd........ ------------------------------ |
2020-03-10 01:57:28 |
191.54.238.74 | attack | DATE:2020-03-09 13:25:27, IP:191.54.238.74, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2020-03-10 02:31:47 |
112.85.42.173 | attackspambots | Mar 9 14:19:04 NPSTNNYC01T sshd[29444]: Failed password for root from 112.85.42.173 port 7173 ssh2 Mar 9 14:19:18 NPSTNNYC01T sshd[29444]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 7173 ssh2 [preauth] Mar 9 14:19:24 NPSTNNYC01T sshd[29453]: Failed password for root from 112.85.42.173 port 33552 ssh2 ... |
2020-03-10 02:20:54 |
142.44.242.38 | attackbotsspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-03-10 02:05:59 |
50.193.109.165 | attackbotsspam | suspicious action Mon, 09 Mar 2020 10:04:25 -0300 |
2020-03-10 02:09:36 |
178.171.45.250 | attackspambots | Chat Spam |
2020-03-10 02:29:44 |
27.34.50.218 | attackspambots | $f2bV_matches |
2020-03-10 01:59:57 |
192.241.219.171 | attack | TCP port 8080: Scan and connection |
2020-03-10 02:27:38 |
168.235.107.3 | attack | 157.245.0.0 - 157.245.255.255 Complex Attacker - USA Net Range 168.235.64.0 - 168.235.127.255 CIDR 168.235.64.0/18 Name RAMNODE-10 Handle NET-168-235-64-0-1 Parent NET-168-0-0-0-0 Net Type DIRECT ALLOCATION Origin AS AS3842 |
2020-03-10 01:55:13 |
106.54.141.45 | attackbots | Mar 9 14:19:03 pkdns2 sshd\[14902\]: Invalid user \[admin\] from 106.54.141.45Mar 9 14:19:05 pkdns2 sshd\[14902\]: Failed password for invalid user \[admin\] from 106.54.141.45 port 47938 ssh2Mar 9 14:22:32 pkdns2 sshd\[15074\]: Invalid user advent from 106.54.141.45Mar 9 14:22:34 pkdns2 sshd\[15074\]: Failed password for invalid user advent from 106.54.141.45 port 58612 ssh2Mar 9 14:26:08 pkdns2 sshd\[15223\]: Invalid user P@ss@word from 106.54.141.45Mar 9 14:26:10 pkdns2 sshd\[15223\]: Failed password for invalid user P@ss@word from 106.54.141.45 port 41056 ssh2 ... |
2020-03-10 01:58:53 |
109.74.199.143 | attack | 109.74.192.0 - 109.74.199.255 Complex Attacker - UK |
2020-03-10 01:54:19 |
37.49.227.109 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 64738 proto: UDP cat: Misc Attack |
2020-03-10 02:25:20 |
185.245.84.227 | attack | 185.245.84.0 - 185.245.84.255 Complex Attacker - Denmark |
2020-03-10 01:53:53 |