City: Wuppertal
Region: Nordrhein-Westfalen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.243.59.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28329
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.243.59.147. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 18:42:32 CST 2025
;; MSG SIZE rcvd: 105
147.59.243.2.in-addr.arpa domain name pointer dynamic-002-243-059-147.2.243.pool.telefonica.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
147.59.243.2.in-addr.arpa name = dynamic-002-243-059-147.2.243.pool.telefonica.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.23.7.76 | attack | Dovecot Invalid User Login Attempt. |
2020-08-06 03:49:12 |
| 69.70.50.102 | attackspambots | Brute force attempt |
2020-08-06 03:47:35 |
| 167.71.94.147 | attack | 167.71.94.147 - - [05/Aug/2020:13:51:26 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.71.94.147 - - [05/Aug/2020:14:10:47 +0200] "POST /xmlrpc.php HTTP/1.1" 403 22621 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-06 04:06:39 |
| 120.92.35.5 | attack | Aug 5 17:52:44 ns382633 sshd\[23793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.35.5 user=root Aug 5 17:52:46 ns382633 sshd\[23793\]: Failed password for root from 120.92.35.5 port 36408 ssh2 Aug 5 17:56:53 ns382633 sshd\[24577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.35.5 user=root Aug 5 17:56:56 ns382633 sshd\[24577\]: Failed password for root from 120.92.35.5 port 9006 ssh2 Aug 5 17:59:45 ns382633 sshd\[24969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.35.5 user=root |
2020-08-06 03:57:47 |
| 195.238.75.227 | attackbotsspam | 195.238.75.227 - - [05/Aug/2020:13:11:07 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 195.238.75.227 - - [05/Aug/2020:13:11:08 +0100] "POST /wp-login.php HTTP/1.1" 200 1929 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 195.238.75.227 - - [05/Aug/2020:13:11:10 +0100] "POST /wp-login.php HTTP/1.1" 200 1926 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-06 03:52:05 |
| 119.29.70.143 | attackspam | Unauthorized SSH login attempts |
2020-08-06 03:36:46 |
| 122.51.241.12 | attackbotsspam | Aug 5 13:32:41 vps46666688 sshd[15440]: Failed password for root from 122.51.241.12 port 53100 ssh2 ... |
2020-08-06 04:12:20 |
| 106.13.164.136 | attackbotsspam | Aug 5 14:43:38 ws24vmsma01 sshd[102015]: Failed password for root from 106.13.164.136 port 50050 ssh2 Aug 5 14:48:46 ws24vmsma01 sshd[180945]: Failed password for root from 106.13.164.136 port 47396 ssh2 ... |
2020-08-06 04:06:17 |
| 45.148.10.90 | attackspam | Brute forcing email accounts |
2020-08-06 03:40:23 |
| 175.202.231.248 | attack | Aug 5 14:11:31 ns382633 sshd\[16678\]: Invalid user pi from 175.202.231.248 port 42152 Aug 5 14:11:31 ns382633 sshd\[16680\]: Invalid user pi from 175.202.231.248 port 42154 Aug 5 14:11:31 ns382633 sshd\[16678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.202.231.248 Aug 5 14:11:31 ns382633 sshd\[16680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.202.231.248 Aug 5 14:11:33 ns382633 sshd\[16678\]: Failed password for invalid user pi from 175.202.231.248 port 42152 ssh2 Aug 5 14:11:34 ns382633 sshd\[16680\]: Failed password for invalid user pi from 175.202.231.248 port 42154 ssh2 |
2020-08-06 03:40:48 |
| 95.154.200.149 | attack | 0,27-01/01 [bc00/m118] PostRequest-Spammer scoring: Durban01 |
2020-08-06 04:04:38 |
| 45.176.213.127 | attack | $f2bV_matches |
2020-08-06 04:09:27 |
| 113.22.185.40 | attack | 1596629464 - 08/05/2020 14:11:04 Host: 113.22.185.40/113.22.185.40 Port: 445 TCP Blocked |
2020-08-06 03:56:30 |
| 218.146.20.61 | attack | Aug 5 08:10:59 Tower sshd[35350]: Connection from 218.146.20.61 port 59478 on 192.168.10.220 port 22 rdomain "" Aug 5 08:11:00 Tower sshd[35350]: Failed password for root from 218.146.20.61 port 59478 ssh2 Aug 5 08:11:00 Tower sshd[35350]: Received disconnect from 218.146.20.61 port 59478:11: Bye Bye [preauth] Aug 5 08:11:00 Tower sshd[35350]: Disconnected from authenticating user root 218.146.20.61 port 59478 [preauth] |
2020-08-06 03:44:36 |
| 62.16.96.69 | attack | Automatic report - Port Scan Attack |
2020-08-06 03:41:13 |