City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.94.22.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.94.22.19. IN A
;; AUTHORITY SECTION:
. 530 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:22:12 CST 2022
;; MSG SIZE rcvd: 105
19.22.94.194.in-addr.arpa domain name pointer www.hwr-berlin.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
19.22.94.194.in-addr.arpa name = www.hwr-berlin.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
127.0.0.1 | attackspambots | Test Connectivity |
2020-09-14 17:45:48 |
20.185.231.189 | attackspambots | Port scan denied |
2020-09-14 17:39:32 |
51.210.109.128 | attackbots | 2020-09-14T12:54:48.623378mail.standpoint.com.ua sshd[8333]: Failed password for root from 51.210.109.128 port 56160 ssh2 2020-09-14T12:58:22.246714mail.standpoint.com.ua sshd[8763]: Invalid user dircreate from 51.210.109.128 port 34708 2020-09-14T12:58:22.249382mail.standpoint.com.ua sshd[8763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-243e392a.vps.ovh.net 2020-09-14T12:58:22.246714mail.standpoint.com.ua sshd[8763]: Invalid user dircreate from 51.210.109.128 port 34708 2020-09-14T12:58:24.949263mail.standpoint.com.ua sshd[8763]: Failed password for invalid user dircreate from 51.210.109.128 port 34708 ssh2 ... |
2020-09-14 18:01:25 |
93.221.47.106 | attackspam | Sep 14 12:44:14 w sshd[24460]: Invalid user pi from 93.221.47.106 Sep 14 12:44:14 w sshd[24461]: Invalid user pi from 93.221.47.106 Sep 14 12:44:14 w sshd[24460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.221.47.106 Sep 14 12:44:14 w sshd[24461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.221.47.106 Sep 14 12:44:17 w sshd[24460]: Failed password for invalid user pi from 93.221.47.106 port 51048 ssh2 Sep 14 12:44:17 w sshd[24461]: Failed password for invalid user pi from 93.221.47.106 port 51052 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=93.221.47.106 |
2020-09-14 18:03:19 |
14.48.22.215 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-09-14 18:00:03 |
111.229.124.215 | attackspambots | $f2bV_matches |
2020-09-14 18:18:21 |
80.82.70.25 | attackbots |
|
2020-09-14 17:45:22 |
80.82.64.242 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-09-14 18:12:21 |
103.205.68.2 | attackspam | Invalid user kmfunyi from 103.205.68.2 port 56666 |
2020-09-14 17:47:27 |
27.131.212.127 | attackbotsspam | Unauthorized connection attempt from IP address 27.131.212.127 on Port 445(SMB) |
2020-09-14 17:53:19 |
176.49.224.81 | attackspambots |
|
2020-09-14 18:08:05 |
12.25.204.187 | attackspam | Automatic report - Port Scan Attack |
2020-09-14 18:15:35 |
95.169.25.38 | attackbotsspam | 95.169.25.38 (US/United States/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 14 05:18:58 server2 sshd[29968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.186.2.18 user=root Sep 14 05:08:10 server2 sshd[24523]: Failed password for root from 138.68.94.142 port 46258 ssh2 Sep 14 05:06:20 server2 sshd[23514]: Failed password for root from 45.248.71.169 port 48282 ssh2 Sep 14 05:08:08 server2 sshd[24523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.94.142 user=root Sep 14 05:12:48 server2 sshd[26719]: Failed password for root from 95.169.25.38 port 37904 ssh2 IP Addresses Blocked: 118.186.2.18 (CN/China/-) 138.68.94.142 (DE/Germany/-) 45.248.71.169 (HK/Hong Kong/-) |
2020-09-14 17:50:10 |
186.4.136.153 | attackspam | Sep 14 11:47:53 lunarastro sshd[15089]: Failed password for root from 186.4.136.153 port 52320 ssh2 |
2020-09-14 17:41:24 |
104.198.172.68 | attackspam | Automatic report - XMLRPC Attack |
2020-09-14 18:16:05 |