City: unknown
Region: unknown
Country: Netherlands (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.121.36.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40978
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.121.36.80. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 21:58:00 CST 2025
;; MSG SIZE rcvd: 106
80.36.121.194.in-addr.arpa domain name pointer static.kpn.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.36.121.194.in-addr.arpa name = static.kpn.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 74.124.24.114 | attack | Repeated brute force against a port |
2020-08-06 03:34:05 |
| 78.138.147.186 | attack | 1596629555 - 08/05/2020 14:12:35 Host: 78.138.147.186/78.138.147.186 Port: 445 TCP Blocked |
2020-08-06 03:06:43 |
| 31.22.248.85 | attackbots | proto=tcp . spt=52939 . dpt=25 . Found on Blocklist de (65) |
2020-08-06 03:11:12 |
| 13.233.150.167 | attackbots | Port probing on unauthorized port 23 |
2020-08-06 02:57:51 |
| 187.72.53.89 | attackbots | Aug 5 04:59:14 pixelmemory sshd[2412479]: Failed password for root from 187.72.53.89 port 54132 ssh2 Aug 5 05:05:37 pixelmemory sshd[2431387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.53.89 user=root Aug 5 05:05:40 pixelmemory sshd[2431387]: Failed password for root from 187.72.53.89 port 37170 ssh2 Aug 5 05:11:55 pixelmemory sshd[2449840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.53.89 user=root Aug 5 05:11:57 pixelmemory sshd[2449840]: Failed password for root from 187.72.53.89 port 48444 ssh2 ... |
2020-08-06 03:27:33 |
| 176.101.101.84 | attackbots | SMB Server BruteForce Attack |
2020-08-06 03:06:30 |
| 95.71.188.17 | attackspam | 1596629567 - 08/05/2020 14:12:47 Host: 95.71.188.17/95.71.188.17 Port: 445 TCP Blocked |
2020-08-06 03:00:18 |
| 45.227.147.75 | attackbots | Automatic report - Port Scan Attack |
2020-08-06 02:56:15 |
| 103.138.108.48 | attackspambots | Aug 5 15:45:15 offspring postfix/smtpd[19143]: connect from unknown[103.138.108.48] Aug 5 15:45:16 offspring postfix/smtpd[19143]: warning: unknown[103.138.108.48]: SASL LOGIN authentication failed: authentication failure Aug 5 15:45:16 offspring postfix/smtpd[19143]: lost connection after AUTH from unknown[103.138.108.48] Aug 5 15:45:16 offspring postfix/smtpd[19143]: disconnect from unknown[103.138.108.48] Aug 5 15:45:17 offspring postfix/smtpd[19143]: connect from unknown[103.138.108.48] Aug 5 15:45:17 offspring postfix/smtpd[19143]: warning: unknown[103.138.108.48]: SASL LOGIN authentication failed: authentication failure Aug 5 15:45:18 offspring postfix/smtpd[19143]: lost connection after AUTH from unknown[103.138.108.48] Aug 5 15:45:18 offspring postfix/smtpd[19143]: disconnect from unknown[103.138.108.48] Aug 5 15:45:18 offspring postfix/smtpd[19143]: connect from unknown[103.138.108.48] Aug 5 15:45:19 offspring postfix/smtpd[19143]: warning: unknown[10........ ------------------------------- |
2020-08-06 03:25:33 |
| 113.182.27.197 | attackbots | 20/8/5@08:11:57: FAIL: Alarm-Intrusion address from=113.182.27.197 ... |
2020-08-06 03:26:44 |
| 171.6.242.178 | attack | Port Scan ... |
2020-08-06 03:31:30 |
| 193.112.250.77 | attack | 2020-08-05T11:22:27.229677ionos.janbro.de sshd[104673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.250.77 user=root 2020-08-05T11:22:29.214076ionos.janbro.de sshd[104673]: Failed password for root from 193.112.250.77 port 58192 ssh2 2020-08-05T11:27:25.114575ionos.janbro.de sshd[104704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.250.77 user=root 2020-08-05T11:27:27.008153ionos.janbro.de sshd[104704]: Failed password for root from 193.112.250.77 port 35350 ssh2 2020-08-05T11:57:27.112224ionos.janbro.de sshd[104824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.250.77 user=root 2020-08-05T11:57:28.724120ionos.janbro.de sshd[104824]: Failed password for root from 193.112.250.77 port 39486 ssh2 2020-08-05T12:02:19.173465ionos.janbro.de sshd[104853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= r ... |
2020-08-06 03:07:40 |
| 41.93.48.72 | attack | Brute forcing Wordpress login |
2020-08-06 03:16:47 |
| 218.92.0.198 | attackspam | Aug 5 18:41:19 marvibiene sshd[23639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198 user=root Aug 5 18:41:21 marvibiene sshd[23639]: Failed password for root from 218.92.0.198 port 34054 ssh2 Aug 5 18:41:23 marvibiene sshd[23639]: Failed password for root from 218.92.0.198 port 34054 ssh2 Aug 5 18:41:19 marvibiene sshd[23639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198 user=root Aug 5 18:41:21 marvibiene sshd[23639]: Failed password for root from 218.92.0.198 port 34054 ssh2 Aug 5 18:41:23 marvibiene sshd[23639]: Failed password for root from 218.92.0.198 port 34054 ssh2 |
2020-08-06 02:57:15 |
| 49.83.139.48 | attack | SSH break in attempt ... |
2020-08-06 03:24:55 |