City: Raab
Region: Oberosterreich
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.118.71.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.118.71.105. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:00:24 CST 2025
;; MSG SIZE rcvd: 107
105.71.118.194.in-addr.arpa domain name pointer 194-118-71-105.adsl.highway.telekom.at.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
105.71.118.194.in-addr.arpa name = 194-118-71-105.adsl.highway.telekom.at.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 213.6.54.242 | attackbots | 23/tcp 23/tcp 23/tcp [2019-05-05/06-22]3pkt |
2019-06-23 12:35:11 |
| 185.176.27.90 | attack | firewall-block, port(s): 35903/tcp, 54397/tcp, 54398/tcp |
2019-06-23 13:14:58 |
| 203.81.251.245 | attackspambots | Brute force attempt |
2019-06-23 13:06:15 |
| 142.93.251.39 | attackspambots | Invalid user Epin from 142.93.251.39 port 47428 |
2019-06-23 13:11:16 |
| 129.144.180.112 | attackbots | Jun 23 05:22:58 hosting sshd[28775]: Invalid user service from 129.144.180.112 port 34538 Jun 23 05:22:58 hosting sshd[28775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-144-180-112.compute.oraclecloud.com Jun 23 05:22:58 hosting sshd[28775]: Invalid user service from 129.144.180.112 port 34538 Jun 23 05:22:59 hosting sshd[28775]: Failed password for invalid user service from 129.144.180.112 port 34538 ssh2 Jun 23 05:26:06 hosting sshd[29033]: Invalid user hadoop from 129.144.180.112 port 51939 ... |
2019-06-23 13:06:45 |
| 24.118.19.247 | attackbots | 20 attempts against mh-ssh on wave.magehost.pro |
2019-06-23 12:45:24 |
| 94.176.76.230 | attackspam | (Jun 23) LEN=40 TTL=244 ID=50068 DF TCP DPT=23 WINDOW=14600 SYN (Jun 23) LEN=40 TTL=244 ID=5027 DF TCP DPT=23 WINDOW=14600 SYN (Jun 23) LEN=40 TTL=244 ID=27829 DF TCP DPT=23 WINDOW=14600 SYN (Jun 22) LEN=40 TTL=244 ID=5358 DF TCP DPT=23 WINDOW=14600 SYN (Jun 22) LEN=40 TTL=244 ID=7561 DF TCP DPT=23 WINDOW=14600 SYN (Jun 22) LEN=40 TTL=244 ID=8651 DF TCP DPT=23 WINDOW=14600 SYN (Jun 22) LEN=40 TTL=244 ID=22480 DF TCP DPT=23 WINDOW=14600 SYN (Jun 22) LEN=40 TTL=244 ID=45239 DF TCP DPT=23 WINDOW=14600 SYN (Jun 22) LEN=40 TTL=244 ID=44605 DF TCP DPT=23 WINDOW=14600 SYN (Jun 22) LEN=40 TTL=244 ID=61580 DF TCP DPT=23 WINDOW=14600 SYN (Jun 22) LEN=40 TTL=244 ID=56463 DF TCP DPT=23 WINDOW=14600 SYN (Jun 21) LEN=40 TTL=244 ID=11269 DF TCP DPT=23 WINDOW=14600 SYN (Jun 21) LEN=40 TTL=244 ID=61785 DF TCP DPT=23 WINDOW=14600 SYN (Jun 21) LEN=40 TTL=244 ID=7175 DF TCP DPT=23 WINDOW=14600 SYN (Jun 21) LEN=40 TTL=244 ID=65298 DF TCP DPT=23 WINDOW=14600 SYN ... |
2019-06-23 12:56:24 |
| 46.101.103.207 | attackspambots | Jun 23 02:13:43 dedicated sshd[26368]: Invalid user google from 46.101.103.207 port 34122 Jun 23 02:13:45 dedicated sshd[26368]: Failed password for invalid user google from 46.101.103.207 port 34122 ssh2 Jun 23 02:13:43 dedicated sshd[26368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.207 Jun 23 02:13:43 dedicated sshd[26368]: Invalid user google from 46.101.103.207 port 34122 Jun 23 02:13:45 dedicated sshd[26368]: Failed password for invalid user google from 46.101.103.207 port 34122 ssh2 |
2019-06-23 12:50:01 |
| 178.33.234.234 | attackspam | $f2bV_matches |
2019-06-23 13:08:43 |
| 212.64.59.94 | attackbotsspam | leo_www |
2019-06-23 12:40:00 |
| 222.188.98.45 | attackspambots | 20 attempts against mh-ssh on light.magehost.pro |
2019-06-23 13:02:58 |
| 185.176.26.61 | attack | 3401/tcp 33778/tcp 5555/tcp... [2019-04-23/06-22]6959pkt,3117pt.(tcp) |
2019-06-23 12:53:11 |
| 179.108.240.190 | attackbotsspam | SMTP-sasl brute force ... |
2019-06-23 13:18:58 |
| 43.247.38.217 | attackbots | 23/tcp 2323/tcp 5555/tcp... [2019-05-20/06-22]8pkt,4pt.(tcp) |
2019-06-23 12:48:37 |
| 93.23.6.66 | attackbots | Invalid user mark from 93.23.6.66 port 60702 |
2019-06-23 13:15:25 |