City: Nürnberg
Region: Bayern
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.55.180.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;162.55.180.197. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:46:04 CST 2025
;; MSG SIZE rcvd: 107
197.180.55.162.in-addr.arpa domain name pointer static.197.180.55.162.clients.your-server.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
197.180.55.162.in-addr.arpa name = static.197.180.55.162.clients.your-server.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 176.126.175.49 | attackspam | [portscan] udp/1900 [ssdp] [portscan] udp/3702 [ws-discovery] [scan/connect: 3 time(s)] *(RWIN=-)(09040932) |
2020-09-04 17:16:40 |
| 151.68.142.20 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-04 16:42:00 |
| 45.142.120.20 | attack | Sep 4 11:01:19 relay postfix/smtpd\[9749\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 4 11:01:55 relay postfix/smtpd\[9660\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 4 11:02:42 relay postfix/smtpd\[4249\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 4 11:03:15 relay postfix/smtpd\[9749\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 4 11:03:56 relay postfix/smtpd\[9660\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-04 17:09:45 |
| 74.219.227.194 | attack | Honeypot attack, port: 445, PTR: rrcs-74-219-227-194.central.biz.rr.com. |
2020-09-04 17:10:34 |
| 200.29.232.154 | attackbotsspam | Unauthorized connection attempt from IP address 200.29.232.154 on Port 445(SMB) |
2020-09-04 17:12:39 |
| 162.142.125.30 | attackbots | Port scanning [6 denied] |
2020-09-04 16:47:22 |
| 37.129.30.173 | attackbotsspam | Unauthorized connection attempt from IP address 37.129.30.173 on Port 445(SMB) |
2020-09-04 17:15:16 |
| 186.93.0.27 | attackbotsspam | Attempted connection to port 445. |
2020-09-04 17:23:28 |
| 182.150.44.41 | attackspambots | Invalid user test from 182.150.44.41 port 34230 |
2020-09-04 17:01:28 |
| 102.182.216.90 | attackbotsspam | Unauthorized connection attempt from IP address 102.182.216.90 on Port 445(SMB) |
2020-09-04 16:56:46 |
| 157.44.169.117 | attack | Unauthorized connection attempt from IP address 157.44.169.117 on Port 445(SMB) |
2020-09-04 17:05:51 |
| 146.68.127.15 | spamattackproxy | 146.68.126.15 |
2020-09-04 17:17:50 |
| 164.132.107.245 | attack | Invalid user user3 from 164.132.107.245 port 53730 |
2020-09-04 16:59:19 |
| 37.182.196.137 | attackbotsspam | Unauthorized connection attempt from IP address 37.182.196.137 on Port 445(SMB) |
2020-09-04 16:46:11 |
| 115.217.19.85 | attackspambots | Lines containing failures of 115.217.19.85 Sep 2 10:52:38 ntop sshd[300]: Invalid user user3 from 115.217.19.85 port 45284 Sep 2 10:52:38 ntop sshd[300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.217.19.85 Sep 2 10:52:40 ntop sshd[300]: Failed password for invalid user user3 from 115.217.19.85 port 45284 ssh2 Sep 2 10:52:42 ntop sshd[300]: Received disconnect from 115.217.19.85 port 45284:11: Bye Bye [preauth] Sep 2 10:52:42 ntop sshd[300]: Disconnected from invalid user user3 115.217.19.85 port 45284 [preauth] Sep 2 10:59:31 ntop sshd[1233]: Invalid user monte from 115.217.19.85 port 40006 Sep 2 10:59:31 ntop sshd[1233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.217.19.85 Sep 2 10:59:33 ntop sshd[1233]: Failed password for invalid user monte from 115.217.19.85 port 40006 ssh2 Sep 2 10:59:35 ntop sshd[1233]: Received disconnect from 115.217.19.85 port 40006:11: ........ ------------------------------ |
2020-09-04 16:55:48 |