City: Jena
Region: Thuringia
Country: Germany
Internet Service Provider: Vodafone
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.203.114.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.203.114.42. IN A
;; AUTHORITY SECTION:
. 511 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020100702 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 08 08:58:10 CST 2020
;; MSG SIZE rcvd: 116
42.114.203.2.in-addr.arpa domain name pointer dslb-002-203-114-042.002.203.pools.vodafone-ip.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.114.203.2.in-addr.arpa name = dslb-002-203-114-042.002.203.pools.vodafone-ip.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
177.188.131.226 | attackbotsspam | Request: "GET / HTTP/1.1" |
2019-06-22 04:41:06 |
142.93.101.41 | attack | DATE:2019-06-21_21:47:26, IP:142.93.101.41, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-06-22 04:06:57 |
42.86.77.124 | attackbots | 23/tcp [2019-06-21]1pkt |
2019-06-22 04:34:04 |
119.109.224.192 | attack | 5500/tcp [2019-06-21]1pkt |
2019-06-22 04:37:16 |
185.255.47.201 | attackbotsspam | Request: "GET / HTTP/1.1" |
2019-06-22 04:49:30 |
185.156.177.30 | attack | Bad Request: "\x03\x00\x00/*\xE0\x00\x00\x00\x00\x00Cookie: mstshash=Administr" |
2019-06-22 04:36:49 |
154.223.171.112 | attackbotsspam | 445/tcp [2019-06-21]1pkt |
2019-06-22 04:41:58 |
134.209.15.14 | attackbots | Jun 21 23:14:10 server2 sshd\[4749\]: User root from 134.209.15.14 not allowed because not listed in AllowUsers Jun 21 23:14:11 server2 sshd\[4751\]: Invalid user admin from 134.209.15.14 Jun 21 23:14:12 server2 sshd\[4753\]: User root from 134.209.15.14 not allowed because not listed in AllowUsers Jun 21 23:14:14 server2 sshd\[4755\]: Invalid user admin from 134.209.15.14 Jun 21 23:14:15 server2 sshd\[4757\]: Invalid user user from 134.209.15.14 Jun 21 23:14:16 server2 sshd\[4759\]: Invalid user user from 134.209.15.14 |
2019-06-22 04:24:45 |
195.128.102.66 | attack | SSH/22 MH Probe, BF, Hack - |
2019-06-22 04:09:39 |
51.255.45.20 | attackspam | Jun 21 21:43:40 mail sshd[3608]: Invalid user nue from 51.255.45.20 Jun 21 21:43:40 mail sshd[3608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.45.20 Jun 21 21:43:40 mail sshd[3608]: Invalid user nue from 51.255.45.20 Jun 21 21:43:41 mail sshd[3608]: Failed password for invalid user nue from 51.255.45.20 port 51968 ssh2 Jun 21 21:46:56 mail sshd[3985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.45.20 user=bin Jun 21 21:46:58 mail sshd[3985]: Failed password for bin from 51.255.45.20 port 47258 ssh2 ... |
2019-06-22 04:21:26 |
178.162.210.6 | attack | Proxy Request: "GET http://178.162.210.6/proxychecker/check.cgi?action=getinfo HTTP/1.0" Proxy Request: "GET http://178.162.210.6/proxychecker/check.cgi?action=getinfo HTTP/1.0" |
2019-06-22 04:17:52 |
89.238.154.18 | attackbots | Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools |
2019-06-22 04:48:52 |
17.133.234.33 | attack | ¯\_(ツ)_/¯ |
2019-06-22 04:43:59 |
182.135.10.233 | attackspambots | 445/tcp [2019-06-21]1pkt |
2019-06-22 04:27:12 |
170.82.22.100 | attackspambots | Request: "GET / HTTP/1.1" |
2019-06-22 04:07:33 |