City: Dortmund
Region: North Rhine-Westphalia
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.100.102.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;193.100.102.42. IN A
;; AUTHORITY SECTION:
. 557 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019103101 1800 900 604800 86400
;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 11:43:06 CST 2019
;; MSG SIZE rcvd: 118
Host 42.102.100.193.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.102.100.193.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
118.69.181.205 | attack | Trying to gain access to my email address |
2020-03-30 19:31:19 |
116.49.189.2 | attackspambots | Port probing on unauthorized port 5555 |
2020-03-30 19:02:02 |
1.53.204.163 | attack | 20/3/30@00:12:41: FAIL: Alarm-Network address from=1.53.204.163 20/3/30@00:12:41: FAIL: Alarm-Network address from=1.53.204.163 ... |
2020-03-30 19:14:51 |
190.121.130.37 | attackbots | Mar 30 09:47:10 |
2020-03-30 18:58:34 |
1.11.201.18 | attack | Mar 30 12:35:28 icinga sshd[37872]: Failed password for root from 1.11.201.18 port 60414 ssh2 Mar 30 12:45:48 icinga sshd[53874]: Failed password for root from 1.11.201.18 port 58086 ssh2 ... |
2020-03-30 19:10:09 |
202.51.74.189 | attackbots | $f2bV_matches |
2020-03-30 19:20:49 |
92.196.225.102 | attack | Mar 30 05:49:26 deb10 sshd[15197]: Invalid user pi from 92.196.225.102 port 54854 Mar 30 05:49:26 deb10 sshd[15198]: Invalid user pi from 92.196.225.102 port 54858 |
2020-03-30 19:25:51 |
170.245.202.34 | attackspambots | IP blocked |
2020-03-30 19:13:50 |
61.153.221.10 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-30 18:55:19 |
128.199.150.215 | attackbotsspam | (sshd) Failed SSH login from 128.199.150.215 (SG/Singapore/-): 5 in the last 3600 secs |
2020-03-30 19:17:25 |
89.46.207.193 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-30 19:08:28 |
156.96.155.231 | attackbotsspam | Automatic report - Port Scan |
2020-03-30 18:49:22 |
37.112.210.237 | attackbots | Fail2Ban Ban Triggered |
2020-03-30 19:29:59 |
156.96.47.16 | attackbots | Mar 30 07:38:43 firewall sshd[12646]: Invalid user ly from 156.96.47.16 Mar 30 07:38:45 firewall sshd[12646]: Failed password for invalid user ly from 156.96.47.16 port 35865 ssh2 Mar 30 07:43:12 firewall sshd[12870]: Invalid user djl from 156.96.47.16 ... |
2020-03-30 19:20:22 |
202.83.10.18 | attackspam | Automatic report - SSH Brute-Force Attack |
2020-03-30 19:01:23 |