City: Villingen-Schwenningen
Region: Baden-Württemberg
Country: Germany
Internet Service Provider: Vodafone
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.204.13.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.204.13.91. IN A
;; AUTHORITY SECTION:
. 508 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024060500 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 05 17:10:36 CST 2024
;; MSG SIZE rcvd: 104
91.13.204.2.in-addr.arpa domain name pointer dslb-002-204-013-091.002.204.pools.vodafone-ip.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
91.13.204.2.in-addr.arpa name = dslb-002-204-013-091.002.204.pools.vodafone-ip.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 58.56.164.66 | attack | Invalid user dylan from 58.56.164.66 port 42772 |
2020-09-16 02:18:54 |
| 36.111.182.49 | attackbots | Port Scan ... |
2020-09-16 02:07:36 |
| 189.14.251.246 | attack | Bruteforce detected by fail2ban |
2020-09-16 02:19:07 |
| 61.1.217.120 | attackbots | Unauthorised access (Sep 14) SRC=61.1.217.120 LEN=52 TTL=111 ID=18201 DF TCP DPT=445 WINDOW=8192 SYN |
2020-09-16 02:10:53 |
| 167.56.252.141 | attackbots | Icarus honeypot on github |
2020-09-16 02:35:40 |
| 68.183.234.57 | attackbotsspam | Invalid user git from 68.183.234.57 port 8452 |
2020-09-16 02:25:12 |
| 216.218.206.67 | attack | 1600184709 - 09/15/2020 22:45:09 Host: scan-06.shadowserver.org/216.218.206.67 Port: 21 TCP Blocked ... |
2020-09-16 02:34:35 |
| 45.129.33.154 | attackbotsspam | "Persistent port scanning" |
2020-09-16 02:28:34 |
| 145.255.9.231 | attackbots | Port Scan ... |
2020-09-16 02:24:02 |
| 154.180.78.59 | attack | 200x100MB request |
2020-09-16 02:27:34 |
| 81.68.100.138 | attackbotsspam | (sshd) Failed SSH login from 81.68.100.138 (CN/China/-): 5 in the last 3600 secs |
2020-09-16 02:33:10 |
| 209.97.134.82 | attack | 2020-09-15T17:50:19.039077shield sshd\[838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=test.thesportsfield.com user=root 2020-09-15T17:50:20.890865shield sshd\[838\]: Failed password for root from 209.97.134.82 port 32918 ssh2 2020-09-15T17:54:12.712724shield sshd\[2440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=test.thesportsfield.com user=root 2020-09-15T17:54:14.693060shield sshd\[2440\]: Failed password for root from 209.97.134.82 port 43852 ssh2 2020-09-15T17:58:25.097185shield sshd\[4115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=test.thesportsfield.com user=root |
2020-09-16 02:08:05 |
| 119.28.132.211 | attackbotsspam | $f2bV_matches |
2020-09-16 02:12:37 |
| 51.68.123.192 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-15T11:26:02Z and 2020-09-15T11:34:32Z |
2020-09-16 02:30:33 |
| 222.237.104.20 | attack | $lgm |
2020-09-16 02:33:59 |