City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.42.12.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.42.12.194. IN A
;; AUTHORITY SECTION:
. 107 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:04:51 CST 2022
;; MSG SIZE rcvd: 106
Host 194.12.42.193.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 194.12.42.193.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
178.128.84.246 | attackspambots | $f2bV_matches |
2019-07-07 01:49:19 |
185.176.27.246 | attackbotsspam | Jul 6 17:29:06 TCP Attack: SRC=185.176.27.246 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=244 PROTO=TCP SPT=45160 DPT=3826 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-07-07 01:54:49 |
217.199.175.231 | attackbots | Unauthorised access (Jul 6) SRC=217.199.175.231 LEN=40 TTL=245 ID=3689 TCP DPT=445 WINDOW=1024 SYN Unauthorised access (Jul 3) SRC=217.199.175.231 LEN=40 TTL=245 ID=48440 TCP DPT=445 WINDOW=1024 SYN Unauthorised access (Jul 1) SRC=217.199.175.231 LEN=40 TTL=245 ID=41933 TCP DPT=445 WINDOW=1024 SYN |
2019-07-07 01:50:28 |
191.53.193.189 | attackbotsspam | SMTP-sasl brute force ... |
2019-07-07 01:12:54 |
148.72.232.158 | attack | Automatic report generated by Wazuh |
2019-07-07 01:46:05 |
94.176.76.65 | attack | (Jul 6) LEN=40 TTL=244 ID=36913 DF TCP DPT=23 WINDOW=14600 SYN (Jul 6) LEN=40 TTL=244 ID=35288 DF TCP DPT=23 WINDOW=14600 SYN (Jul 6) LEN=40 TTL=244 ID=32857 DF TCP DPT=23 WINDOW=14600 SYN (Jul 6) LEN=40 TTL=244 ID=5552 DF TCP DPT=23 WINDOW=14600 SYN (Jul 6) LEN=40 TTL=244 ID=38462 DF TCP DPT=23 WINDOW=14600 SYN (Jul 6) LEN=40 TTL=244 ID=28410 DF TCP DPT=23 WINDOW=14600 SYN (Jul 6) LEN=40 TTL=244 ID=26666 DF TCP DPT=23 WINDOW=14600 SYN (Jul 5) LEN=40 TTL=244 ID=42603 DF TCP DPT=23 WINDOW=14600 SYN (Jul 5) LEN=40 TTL=244 ID=32039 DF TCP DPT=23 WINDOW=14600 SYN (Jul 5) LEN=40 TTL=244 ID=9115 DF TCP DPT=23 WINDOW=14600 SYN (Jul 5) LEN=40 TTL=244 ID=40843 DF TCP DPT=23 WINDOW=14600 SYN (Jul 5) LEN=40 TTL=244 ID=48509 DF TCP DPT=23 WINDOW=14600 SYN (Jul 5) LEN=40 TTL=244 ID=32159 DF TCP DPT=23 WINDOW=14600 SYN (Jul 5) LEN=40 TTL=244 ID=50359 DF TCP DPT=23 WINDOW=14600 SYN (Jul 5) LEN=40 TTL=244 ID=41976 DF TCP DPT=23 WINDOW=14600 SY... |
2019-07-07 01:59:35 |
134.73.161.52 | attackspam | Jul 4 18:30:39 sanyalnet-cloud-vps2 sshd[20812]: Connection from 134.73.161.52 port 59052 on 45.62.253.138 port 22 Jul 4 18:30:40 sanyalnet-cloud-vps2 sshd[20812]: Invalid user da from 134.73.161.52 port 59052 Jul 4 18:30:40 sanyalnet-cloud-vps2 sshd[20812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.161.52 Jul 4 18:30:42 sanyalnet-cloud-vps2 sshd[20812]: Failed password for invalid user da from 134.73.161.52 port 59052 ssh2 Jul 4 18:30:42 sanyalnet-cloud-vps2 sshd[20812]: Received disconnect from 134.73.161.52 port 59052:11: Bye Bye [preauth] Jul 4 18:30:42 sanyalnet-cloud-vps2 sshd[20812]: Disconnected from 134.73.161.52 port 59052 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=134.73.161.52 |
2019-07-07 01:38:40 |
125.191.33.98 | attackspam | Autoban 125.191.33.98 AUTH/CONNECT |
2019-07-07 01:24:59 |
193.112.48.179 | attackbots | Reported by AbuseIPDB proxy server. |
2019-07-07 01:47:32 |
46.252.240.134 | attack | 445/tcp 445/tcp 445/tcp [2019-05-16/07-06]3pkt |
2019-07-07 02:03:13 |
36.90.165.29 | attackspam | Jul 6 15:44:33 XXX sshd[30523]: Invalid user miusuario from 36.90.165.29 port 43030 |
2019-07-07 01:36:50 |
128.199.149.61 | attackbots | ssh failed login |
2019-07-07 01:34:39 |
115.159.143.217 | attackspam | Jul 6 17:05:27 core01 sshd\[25098\]: Invalid user team4 from 115.159.143.217 port 47357 Jul 6 17:05:27 core01 sshd\[25098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.143.217 ... |
2019-07-07 01:34:09 |
81.22.45.253 | attack | Port scan on 9 port(s): 1935 4200 5200 6364 11001 13619 20464 23748 26139 |
2019-07-07 01:37:49 |
165.22.32.249 | attack | RDPBruteCAu |
2019-07-07 01:23:59 |