City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.242.98.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.242.98.166. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 01:33:34 CST 2025
;; MSG SIZE rcvd: 105
166.98.242.2.in-addr.arpa domain name pointer dynamic-002-242-098-166.2.242.pool.telefonica.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
166.98.242.2.in-addr.arpa name = dynamic-002-242-098-166.2.242.pool.telefonica.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 101.96.143.79 | attack | Jun 24 04:10:05 onepixel sshd[1860268]: Invalid user csserver from 101.96.143.79 port 19430 Jun 24 04:10:05 onepixel sshd[1860268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.96.143.79 Jun 24 04:10:05 onepixel sshd[1860268]: Invalid user csserver from 101.96.143.79 port 19430 Jun 24 04:10:08 onepixel sshd[1860268]: Failed password for invalid user csserver from 101.96.143.79 port 19430 ssh2 Jun 24 04:12:43 onepixel sshd[1861550]: Invalid user king from 101.96.143.79 port 38652 |
2020-06-24 13:15:48 |
| 222.186.190.17 | attack | Jun 24 06:50:49 OPSO sshd\[14666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.17 user=root Jun 24 06:50:50 OPSO sshd\[14666\]: Failed password for root from 222.186.190.17 port 43616 ssh2 Jun 24 06:50:53 OPSO sshd\[14666\]: Failed password for root from 222.186.190.17 port 43616 ssh2 Jun 24 06:50:55 OPSO sshd\[14666\]: Failed password for root from 222.186.190.17 port 43616 ssh2 Jun 24 06:53:31 OPSO sshd\[14922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.17 user=root |
2020-06-24 13:16:12 |
| 51.83.33.156 | attack | Jun 24 06:12:45 haigwepa sshd[29247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.33.156 Jun 24 06:12:47 haigwepa sshd[29247]: Failed password for invalid user apache from 51.83.33.156 port 34182 ssh2 ... |
2020-06-24 13:30:26 |
| 185.116.194.36 | attackspambots | Invalid user student3 from 185.116.194.36 port 47408 |
2020-06-24 13:05:09 |
| 186.85.159.135 | attack | Jun 23 21:56:07 dignus sshd[28635]: Failed password for invalid user qsb from 186.85.159.135 port 56769 ssh2 Jun 23 21:58:13 dignus sshd[28804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.85.159.135 user=root Jun 23 21:58:15 dignus sshd[28804]: Failed password for root from 186.85.159.135 port 38561 ssh2 Jun 23 22:00:17 dignus sshd[29029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.85.159.135 user=root Jun 23 22:00:19 dignus sshd[29029]: Failed password for root from 186.85.159.135 port 18657 ssh2 ... |
2020-06-24 13:15:16 |
| 189.39.102.67 | attackspam | Jun 23 19:33:43 auw2 sshd\[1597\]: Invalid user git from 189.39.102.67 Jun 23 19:33:43 auw2 sshd\[1597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.39.102.67 Jun 23 19:33:45 auw2 sshd\[1597\]: Failed password for invalid user git from 189.39.102.67 port 43196 ssh2 Jun 23 19:36:02 auw2 sshd\[1821\]: Invalid user fredy from 189.39.102.67 Jun 23 19:36:02 auw2 sshd\[1821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.39.102.67 |
2020-06-24 13:38:28 |
| 62.210.206.110 | attackbots | Jun 24 07:22:14 vps sshd[233606]: Failed password for invalid user zqm from 62.210.206.110 port 45590 ssh2 Jun 24 07:25:18 vps sshd[251754]: Invalid user mexico from 62.210.206.110 port 45466 Jun 24 07:25:19 vps sshd[251754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-210-206-110.rev.poneytelecom.eu Jun 24 07:25:21 vps sshd[251754]: Failed password for invalid user mexico from 62.210.206.110 port 45466 ssh2 Jun 24 07:28:33 vps sshd[264636]: Invalid user lhd from 62.210.206.110 port 45336 ... |
2020-06-24 13:42:59 |
| 222.186.30.76 | attackspambots | Jun 23 18:58:42 hpm sshd\[29114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76 user=root Jun 23 18:58:44 hpm sshd\[29114\]: Failed password for root from 222.186.30.76 port 34826 ssh2 Jun 23 18:58:46 hpm sshd\[29114\]: Failed password for root from 222.186.30.76 port 34826 ssh2 Jun 23 18:58:49 hpm sshd\[29114\]: Failed password for root from 222.186.30.76 port 34826 ssh2 Jun 23 18:58:50 hpm sshd\[29132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76 user=root |
2020-06-24 13:03:13 |
| 46.38.150.193 | attack | 2020-06-23T22:57:49.546906linuxbox-skyline auth[139800]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=guest5 rhost=46.38.150.193 ... |
2020-06-24 12:58:38 |
| 195.54.166.101 | attackbots | Persistent port scanning [94 denied] |
2020-06-24 13:40:44 |
| 89.248.168.51 | attackbotsspam | " " |
2020-06-24 13:22:11 |
| 52.188.170.177 | attackbots | Brute forcing email accounts |
2020-06-24 13:39:13 |
| 34.76.172.157 | attack | Automatic report - XMLRPC Attack |
2020-06-24 13:32:58 |
| 123.206.64.111 | attackbotsspam | Invalid user katrina from 123.206.64.111 port 51486 |
2020-06-24 13:06:00 |
| 36.153.84.58 | attackspambots | 06/23/2020-23:57:03.129919 36.153.84.58 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-06-24 13:14:59 |