City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.138.212.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.138.212.118. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:50:59 CST 2025
;; MSG SIZE rcvd: 108
118.212.138.193.in-addr.arpa domain name pointer mail.airmail.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
118.212.138.193.in-addr.arpa name = mail.airmail.ch.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 78.189.217.53 | attackspambots | 1591184979 - 06/03/2020 13:49:39 Host: 78.189.217.53/78.189.217.53 Port: 445 TCP Blocked |
2020-06-04 02:08:17 |
| 63.83.75.75 | attackspam | SpamScore above: 10.0 |
2020-06-04 02:05:40 |
| 91.121.116.65 | attackbots | 2020-06-03T14:22:36.193517shield sshd\[23151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns349510.ip-91-121-116.eu user=root 2020-06-03T14:22:38.182772shield sshd\[23151\]: Failed password for root from 91.121.116.65 port 54138 ssh2 2020-06-03T14:26:10.705748shield sshd\[23669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns349510.ip-91-121-116.eu user=root 2020-06-03T14:26:13.065693shield sshd\[23669\]: Failed password for root from 91.121.116.65 port 33720 ssh2 2020-06-03T14:29:41.282930shield sshd\[24043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns349510.ip-91-121-116.eu user=root |
2020-06-04 02:00:53 |
| 41.67.137.243 | attackspam | firewall-block, port(s): 6238/tcp |
2020-06-04 02:01:36 |
| 222.186.175.216 | attackbots | 2020-06-03T20:38:00.096809sd-86998 sshd[4761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root 2020-06-03T20:38:01.795814sd-86998 sshd[4761]: Failed password for root from 222.186.175.216 port 36508 ssh2 2020-06-03T20:38:04.581077sd-86998 sshd[4761]: Failed password for root from 222.186.175.216 port 36508 ssh2 2020-06-03T20:38:00.096809sd-86998 sshd[4761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root 2020-06-03T20:38:01.795814sd-86998 sshd[4761]: Failed password for root from 222.186.175.216 port 36508 ssh2 2020-06-03T20:38:04.581077sd-86998 sshd[4761]: Failed password for root from 222.186.175.216 port 36508 ssh2 2020-06-03T20:38:00.096809sd-86998 sshd[4761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root 2020-06-03T20:38:01.795814sd-86998 sshd[4761]: Failed password for root from 2 ... |
2020-06-04 02:41:43 |
| 196.44.236.213 | attack |
|
2020-06-04 02:28:07 |
| 185.104.71.76 | attackspam | xmlrpc attack |
2020-06-04 02:08:32 |
| 20.185.224.24 | attackbotsspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-06-04 02:31:28 |
| 134.209.148.107 | attack | web-1 [ssh] SSH Attack |
2020-06-04 02:14:46 |
| 89.252.232.82 | attack | Jun 3 21:15:25 debian kernel: [110689.511143] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=89.252.232.82 DST=89.252.131.35 LEN=44 TOS=0x00 PREC=0x00 TTL=237 ID=2587 DF PROTO=TCP SPT=1089 DPT=8291 WINDOW=14600 RES=0x00 SYN URGP=0 |
2020-06-04 02:36:33 |
| 212.64.16.31 | attackspam | ... |
2020-06-04 01:59:02 |
| 117.44.46.13 | attack | Jun 3 11:43:26 mailman postfix/smtpd[5398]: warning: unknown[117.44.46.13]: SASL LOGIN authentication failed: authentication failure |
2020-06-04 02:20:15 |
| 91.134.185.90 | attackbots | Automatic report - Banned IP Access |
2020-06-04 02:16:23 |
| 185.156.73.67 | attackbots | 06/03/2020-11:00:44.099781 185.156.73.67 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-04 01:59:27 |
| 105.112.96.33 | attackspambots | xmlrpc attack |
2020-06-04 02:22:29 |