City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.89.63.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7978
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.89.63.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 23:45:47 CST 2025
;; MSG SIZE rcvd: 105
138.63.89.18.in-addr.arpa domain name pointer ec2-18-89-63-138.eu-central-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.63.89.18.in-addr.arpa name = ec2-18-89-63-138.eu-central-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 107.180.97.176 | attackspam | US - - [20 Nov 2018:04:49:27 +0300] "\n" 400 10119 "-" "-" |
2020-02-02 14:14:43 |
| 155.138.231.139 | attackbots | Brute forcing email accounts |
2020-02-02 15:25:35 |
| 5.135.121.238 | attack | Unauthorized connection attempt detected from IP address 5.135.121.238 to port 2220 [J] |
2020-02-02 15:15:36 |
| 42.231.162.14 | attackspambots | Feb 2 05:56:58 grey postfix/smtpd\[22281\]: NOQUEUE: reject: RCPT from unknown\[42.231.162.14\]: 554 5.7.1 Service unavailable\; Client host \[42.231.162.14\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[42.231.162.14\]\; from=\ |
2020-02-02 14:23:22 |
| 222.96.109.44 | attack | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-02-02 15:21:21 |
| 212.67.224.230 | attackspambots | Feb 2 11:27:26 gw1 sshd[1948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.67.224.230 Feb 2 11:27:28 gw1 sshd[1948]: Failed password for invalid user server from 212.67.224.230 port 57608 ssh2 ... |
2020-02-02 15:02:06 |
| 217.182.197.93 | attackbotsspam | 217.182.197.93 - - [02/Feb/2020:04:56:10 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 217.182.197.93 - - [02/Feb/2020:04:56:12 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 5770 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-02-02 15:04:57 |
| 104.245.144.41 | attackspambots | (From micki.liardet@hotmail.com) Would you like to submit your advertisement on 1000's of Advertising sites monthly? One tiny investment every month will get you virtually endless traffic to your site forever!To find out more check out our site here: http://www.submitmyadnow.tech |
2020-02-02 14:12:53 |
| 45.226.72.182 | attackbots | Unauthorized connection attempt detected from IP address 45.226.72.182 to port 2220 [J] |
2020-02-02 15:15:16 |
| 45.134.179.20 | attack | Type Date/Time Event Description info Feb 1 21:47:08 IN=br1 MAC=94:c1:50:cd:6f:b4 SRC=45.134.179.20 DST=XXX.XXX.XXX.XXX LEN=52 TTL=108 PROTO=TCP DPT=5900 Accessing Pinhole |
2020-02-02 14:51:15 |
| 106.13.136.73 | attack | Unauthorized connection attempt detected from IP address 106.13.136.73 to port 2220 [J] |
2020-02-02 14:12:21 |
| 106.13.173.161 | attackbots | Feb 1 20:12:40 web9 sshd\[28134\]: Invalid user tsbot from 106.13.173.161 Feb 1 20:12:40 web9 sshd\[28134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.161 Feb 1 20:12:42 web9 sshd\[28134\]: Failed password for invalid user tsbot from 106.13.173.161 port 57826 ssh2 Feb 1 20:15:30 web9 sshd\[28328\]: Invalid user hadoop from 106.13.173.161 Feb 1 20:15:30 web9 sshd\[28328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.173.161 |
2020-02-02 15:00:30 |
| 140.143.2.228 | attackspambots | 2020-02-02T00:44:35.0185061495-001 sshd[22591]: Invalid user uftp from 140.143.2.228 port 50762 2020-02-02T00:44:35.0217231495-001 sshd[22591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.2.228 2020-02-02T00:44:35.0185061495-001 sshd[22591]: Invalid user uftp from 140.143.2.228 port 50762 2020-02-02T00:44:37.8678831495-001 sshd[22591]: Failed password for invalid user uftp from 140.143.2.228 port 50762 ssh2 2020-02-02T00:49:08.5970781495-001 sshd[22750]: Invalid user oracle from 140.143.2.228 port 48648 2020-02-02T00:49:08.6058131495-001 sshd[22750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.2.228 2020-02-02T00:49:08.5970781495-001 sshd[22750]: Invalid user oracle from 140.143.2.228 port 48648 2020-02-02T00:49:10.9303321495-001 sshd[22750]: Failed password for invalid user oracle from 140.143.2.228 port 48648 ssh2 2020-02-02T00:53:34.7370621495-001 sshd[22938]: Invalid user user fr ... |
2020-02-02 14:26:46 |
| 137.117.182.16 | attackspam | Brute forcing email accounts |
2020-02-02 14:20:50 |
| 183.102.85.214 | attackbots | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-02 14:27:38 |