City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.4.16.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35977
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.4.16.29. IN A
;; AUTHORITY SECTION:
. 596 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:45:25 CST 2022
;; MSG SIZE rcvd: 104
Host 29.16.4.164.in-addr.arpa not found: 2(SERVFAIL)
b';; Truncated, retrying in TCP mode.
29.16.4.164.in-addr.arpa name = coromant.nl.
29.16.4.164.in-addr.arpa name = coroguide.com.
29.16.4.164.in-addr.arpa name = coromant.com.
29.16.4.164.in-addr.arpa name = prometec.de.
29.16.4.164.in-addr.arpa name = mysandvikcoromant.com.
29.16.4.164.in-addr.arpa name = www.compositemachining.org.
29.16.4.164.in-addr.arpa name = coromantgw.prod.tibp.sandvik.com.
29.16.4.164.in-addr.arpa name = www.coroguide.com.
29.16.4.164.in-addr.arpa name = sandvikcoromant.com.
29.16.4.164.in-addr.arpa name = coromant.net.
29.16.4.164.in-addr.arpa name = coromant.pl.
29.16.4.164.in-addr.arpa name = drillingknowledge.com.
29.16.4.164.in-addr.arpa name = www.prometec.de.
29.16.4.164.in-addr.arpa name = aeroknowledge.com.
29.16.4.164.in-addr.arpa name = milling.sandvikcoromant.
29.16.4.164.in-addr.arpa name = drillingknowledge.co.uk.
29.16.4.164.in-addr.arpa name = www.reconditioning.walter.
29.16.4.164.in-addr.arpa name = nic.sandvikcoromant.
29.16.4.164.in-addr.arpa name = metalcuttingknowledge.com.
29.16.4.164.in-addr.arpa name = compositemachining.org.
29.16.4.164.in-addr.arpa name = aero-knowledge.com.
29.16.4.164.in-addr.arpa name = home.sandvikcoromant.
29.16.4.164.in-addr.arpa name = www.sandvikcoromant.
29.16.4.164.in-addr.arpa name = sandvik.coromant.com.
29.16.4.164.in-addr.arpa name = coromant.org.
29.16.4.164.in-addr.arpa name = www.home.sandvikcoromant.
29.16.4.164.in-addr.arpa name = sandvikcoromant.org.
29.16.4.164.in-addr.arpa name = www.milling.sandvikcoromant.
Authoritative answers can be found from:
'
IP | Type | Details | Datetime |
---|---|---|---|
104.166.90.77 | attackbotsspam | 01/21/2020-05:57:00.056141 104.166.90.77 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-01-21 13:25:46 |
121.154.67.139 | attackspam | Unauthorized connection attempt detected from IP address 121.154.67.139 to port 23 [J] |
2020-01-21 13:47:25 |
117.4.33.233 | attackspam | Unauthorised access (Jan 21) SRC=117.4.33.233 LEN=52 TTL=109 ID=24764 DF TCP DPT=445 WINDOW=8192 SYN |
2020-01-21 13:15:09 |
140.143.139.14 | attackbotsspam | $f2bV_matches |
2020-01-21 13:30:27 |
89.185.26.11 | attack | Unauthorized connection attempt detected from IP address 89.185.26.11 to port 5555 [J] |
2020-01-21 13:48:39 |
1.213.195.154 | attackbots | Jan 21 06:08:56 ovpn sshd\[5836\]: Invalid user support from 1.213.195.154 Jan 21 06:08:56 ovpn sshd\[5836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154 Jan 21 06:08:58 ovpn sshd\[5836\]: Failed password for invalid user support from 1.213.195.154 port 14131 ssh2 Jan 21 06:10:08 ovpn sshd\[6141\]: Invalid user postgres from 1.213.195.154 Jan 21 06:10:08 ovpn sshd\[6141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154 |
2020-01-21 13:33:43 |
191.248.74.56 | attackspambots | Telnet Server BruteForce Attack |
2020-01-21 13:17:40 |
210.13.100.26 | attack | Unauthorized connection attempt detected from IP address 210.13.100.26 to port 5555 [J] |
2020-01-21 13:42:34 |
209.99.170.229 | attackspambots | Automatic report - Banned IP Access |
2020-01-21 13:14:47 |
206.189.155.76 | attackspam | xmlrpc attack |
2020-01-21 13:24:17 |
218.92.0.184 | attack | 2020-01-21T05:04:26.593049dmca.cloudsearch.cf sshd[17702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184 user=root 2020-01-21T05:04:28.141580dmca.cloudsearch.cf sshd[17702]: Failed password for root from 218.92.0.184 port 61383 ssh2 2020-01-21T05:04:31.341453dmca.cloudsearch.cf sshd[17702]: Failed password for root from 218.92.0.184 port 61383 ssh2 2020-01-21T05:04:26.593049dmca.cloudsearch.cf sshd[17702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184 user=root 2020-01-21T05:04:28.141580dmca.cloudsearch.cf sshd[17702]: Failed password for root from 218.92.0.184 port 61383 ssh2 2020-01-21T05:04:31.341453dmca.cloudsearch.cf sshd[17702]: Failed password for root from 218.92.0.184 port 61383 ssh2 2020-01-21T05:04:26.593049dmca.cloudsearch.cf sshd[17702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184 user=root 2020-01-21T05:0 ... |
2020-01-21 13:12:23 |
222.186.31.83 | attack | Jan 21 06:25:38 vmanager6029 sshd\[12468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83 user=root Jan 21 06:25:40 vmanager6029 sshd\[12468\]: Failed password for root from 222.186.31.83 port 54800 ssh2 Jan 21 06:25:43 vmanager6029 sshd\[12468\]: Failed password for root from 222.186.31.83 port 54800 ssh2 |
2020-01-21 13:26:37 |
177.126.137.109 | attackspambots | Unauthorized connection attempt detected from IP address 177.126.137.109 to port 5555 [J] |
2020-01-21 13:44:49 |
187.173.224.205 | attackbots | $f2bV_matches |
2020-01-21 13:33:14 |
37.111.136.214 | attackspambots | none |
2020-01-21 13:35:29 |