City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.12.20.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3462
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.12.20.34. IN A
;; AUTHORITY SECTION:
. 476 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 21:54:31 CST 2022
;; MSG SIZE rcvd: 105
34.20.12.193.in-addr.arpa is an alias for 34.0.20.12.193.in-addr.arpa.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.fi.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.no.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.se.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.com.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.dk.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.fi.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.no.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.se.
34.0.20.12.193.in-addr.arpa domain name pointer lensway.com.
34.0.20.12.193.in-addr.arpa domain name pointer www.lensway.dk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.20.12.193.in-addr.arpa canonical name = 34.0.20.12.193.in-addr.arpa.
34.0.20.12.193.in-addr.arpa name = www.lensway.no.
34.0.20.12.193.in-addr.arpa name = www.lensway.se.
34.0.20.12.193.in-addr.arpa name = www.lensway.com.
34.0.20.12.193.in-addr.arpa name = lensway.dk.
34.0.20.12.193.in-addr.arpa name = lensway.fi.
34.0.20.12.193.in-addr.arpa name = lensway.no.
34.0.20.12.193.in-addr.arpa name = lensway.se.
34.0.20.12.193.in-addr.arpa name = lensway.com.
34.0.20.12.193.in-addr.arpa name = www.lensway.dk.
34.0.20.12.193.in-addr.arpa name = www.lensway.fi.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
94.102.51.95 | attack | Port scan on 17 port(s): 3710 4085 6441 7148 12503 17424 22840 26590 35180 35776 38224 41643 41647 42622 59487 59854 61503 |
2020-09-06 07:30:27 |
77.40.3.156 | attack | proto=tcp . spt=16066 . dpt=25 . Found on Blocklist de (166) |
2020-09-06 07:41:06 |
92.40.195.118 | attackbotsspam | Port Scan: TCP/443 |
2020-09-06 07:47:05 |
201.95.86.224 | attackbots | Icarus honeypot on github |
2020-09-06 07:30:11 |
123.201.12.190 | attackbotsspam | Aug 31 07:14:39 uapps sshd[25202]: Invalid user admin from 123.201.12.190 port 55309 Aug 31 07:14:41 uapps sshd[25202]: Failed password for invalid user admin from 123.201.12.190 port 55309 ssh2 Aug 31 07:14:42 uapps sshd[25202]: Received disconnect from 123.201.12.190 port 55309:11: Bye Bye [preauth] Aug 31 07:14:42 uapps sshd[25202]: Disconnected from invalid user admin 123.201.12.190 port 55309 [preauth] Aug 31 07:14:43 uapps sshd[25204]: Invalid user admin from 123.201.12.190 port 55440 Aug 31 07:14:46 uapps sshd[25204]: Failed password for invalid user admin from 123.201.12.190 port 55440 ssh2 Aug 31 07:14:47 uapps sshd[25204]: Received disconnect from 123.201.12.190 port 55440:11: Bye Bye [preauth] Aug 31 07:14:47 uapps sshd[25204]: Disconnected from invalid user admin 123.201.12.190 port 55440 [preauth] Aug 31 07:14:48 uapps sshd[25206]: Invalid user admin from 123.201.12.190 port 55541 Aug 31 07:14:50 uapps sshd[25206]: Failed password for invalid user admin fro........ ------------------------------- |
2020-09-06 07:27:22 |
51.75.87.58 | attack | 2020-09-05 12:39:32.540258-0500 localhost smtpd[46585]: NOQUEUE: reject: RCPT from unknown[51.75.87.58]: 450 4.7.25 Client host rejected: cannot find your hostname, [51.75.87.58]; from= |
2020-09-06 07:37:53 |
171.103.190.158 | attackbots | failed attempts to access the website, searching for vulnerabilities, also using following IPs: 27.37.246.129 , 94.231.218.223 , 116.90.237.125 , 190.235.214.78 , 190.98.53.86 , 45.170.129.135 , 170.239.242.222 , 43.249.113.243 , 103.140.4.87 , 171.103.190.158 , 72.210.252.135 |
2020-09-06 07:35:16 |
36.71.190.252 | attackbots | Automatic report - Port Scan Attack |
2020-09-06 07:32:16 |
91.106.38.182 | attackbotsspam | 2020-09-05 11:37:41.137096-0500 localhost smtpd[41784]: NOQUEUE: reject: RCPT from unknown[91.106.38.182]: 554 5.7.1 Service unavailable; Client host [91.106.38.182] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/91.106.38.182; from= |
2020-09-06 07:39:33 |
121.40.212.94 | attackspambots | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-06 07:21:04 |
75.162.234.20 | attackbots | Brute forcing email accounts |
2020-09-06 07:26:11 |
171.13.47.75 | attackbots | Lines containing failures of 171.13.47.75 (max 1000) ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=171.13.47.75 |
2020-09-06 07:15:41 |
191.240.39.77 | attackspam | Sep 5 18:47:52 *host* postfix/smtps/smtpd\[6352\]: warning: unknown\[191.240.39.77\]: SASL PLAIN authentication failed: |
2020-09-06 07:49:17 |
198.245.49.207 | attack | MYH,DEF GET /admin/ |
2020-09-06 07:48:59 |
103.147.10.222 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-09-06 07:18:04 |