City: Mannheim
Region: Baden-Württemberg
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.212.211.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6485
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.212.211.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062801 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 10:36:10 CST 2025
;; MSG SIZE rcvd: 106
142.211.212.2.in-addr.arpa domain name pointer dynamic-002-212-211-142.2.212.pool.telefonica.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.211.212.2.in-addr.arpa name = dynamic-002-212-211-142.2.212.pool.telefonica.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 128.199.202.206 | attackbots | Feb 19 13:07:47 php1 sshd\[25964\]: Invalid user cpaneleximscanner from 128.199.202.206 Feb 19 13:07:47 php1 sshd\[25964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.202.206 Feb 19 13:07:49 php1 sshd\[25964\]: Failed password for invalid user cpaneleximscanner from 128.199.202.206 port 59880 ssh2 Feb 19 13:10:51 php1 sshd\[26384\]: Invalid user hfbx from 128.199.202.206 Feb 19 13:10:51 php1 sshd\[26384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.202.206 |
2020-02-20 09:03:01 |
| 179.63.252.138 | attackspambots | Port probing on unauthorized port 23 |
2020-02-20 09:14:18 |
| 106.127.184.114 | attack | Telnetd brute force attack detected by fail2ban |
2020-02-20 08:52:28 |
| 176.106.162.202 | attackbotsspam | Port probing on unauthorized port 4567 |
2020-02-20 09:27:27 |
| 104.40.95.185 | attackspambots | Invalid user dasusr1 from 104.40.95.185 port 40752 |
2020-02-20 09:25:01 |
| 122.51.30.101 | attackspam | Unauthorized connection attempt detected from IP address 122.51.30.101 to port 22 |
2020-02-20 09:22:38 |
| 78.189.17.33 | attackbotsspam | Port probing on unauthorized port 23 |
2020-02-20 08:51:39 |
| 80.253.29.58 | attackbotsspam | Feb 19 17:38:42 : SSH login attempts with invalid user |
2020-02-20 09:03:50 |
| 2001:470:dfa9:10ff:0:242:ac11:26 | attackbots | Port scan |
2020-02-20 08:48:08 |
| 222.186.175.148 | attackbotsspam | SSH bruteforce |
2020-02-20 08:52:10 |
| 187.162.42.135 | attackbots | Automatic report - Port Scan Attack |
2020-02-20 08:54:03 |
| 89.129.17.5 | attack | Feb 20 00:09:01 vps670341 sshd[6967]: Invalid user user from 89.129.17.5 port 34148 |
2020-02-20 08:53:00 |
| 103.36.8.146 | attackbotsspam | Feb 19 22:54:46 grey postfix/smtpd\[16066\]: NOQUEUE: reject: RCPT from unknown\[103.36.8.146\]: 554 5.7.1 Service unavailable\; Client host \[103.36.8.146\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?103.36.8.146\; from=\ |
2020-02-20 08:49:47 |
| 86.35.37.186 | attackspam | Feb 19 14:31:43 php1 sshd\[1347\]: Invalid user jianhaoc from 86.35.37.186 Feb 19 14:31:43 php1 sshd\[1347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.35.37.186 Feb 19 14:31:45 php1 sshd\[1347\]: Failed password for invalid user jianhaoc from 86.35.37.186 port 38386 ssh2 Feb 19 14:36:09 php1 sshd\[1805\]: Invalid user cpaneleximscanner from 86.35.37.186 Feb 19 14:36:09 php1 sshd\[1805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.35.37.186 |
2020-02-20 09:07:32 |
| 185.209.0.32 | attack | Feb 20 01:28:36 debian-2gb-nbg1-2 kernel: \[4417728.822866\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.209.0.32 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=12867 PROTO=TCP SPT=50780 DPT=3516 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-20 08:56:19 |