City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
bb'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:8d8:1000:f0ad:fb43:8f85:1d73:b03a
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 17988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:8d8:1000:f0ad:fb43:8f85:1d73:b03a.	IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Feb 19 00:35:39 CST 2022
;; MSG SIZE  rcvd: 67
'a.3.0.b.3.7.d.1.5.8.f.8.3.4.b.f.d.a.0.f.0.0.0.1.8.d.8.0.1.0.0.2.ip6.arpa domain name pointer kundenserver.de.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
a.3.0.b.3.7.d.1.5.8.f.8.3.4.b.f.d.a.0.f.0.0.0.1.8.d.8.0.1.0.0.2.ip6.arpa	name = kundenserver.de.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 27.155.65.3 | attack | Bruteforce detected by fail2ban | 2020-04-23 07:20:09 | 
| 124.236.22.12 | attackbotsspam | run attacks on the service SSH | 2020-04-23 06:49:55 | 
| 157.230.230.152 | attackbots | Apr 22 21:43:48 : SSH login attempts with invalid user | 2020-04-23 06:48:29 | 
| 159.89.110.45 | attackbots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: | 2020-04-23 06:52:25 | 
| 183.56.218.62 | attackbots | run attacks on the service SSH | 2020-04-23 07:25:20 | 
| 115.84.91.211 | attackbotsspam | proto=tcp . spt=58880 . dpt=993 . src=115.84.91.211 . dst=xx.xx.4.1 . Found on Blocklist de (398) | 2020-04-23 06:50:11 | 
| 188.166.23.215 | attack | Apr 22 23:39:34 Ubuntu-1404-trusty-64-minimal sshd\[20793\]: Invalid user testftp from 188.166.23.215 Apr 22 23:39:34 Ubuntu-1404-trusty-64-minimal sshd\[20793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.23.215 Apr 22 23:39:36 Ubuntu-1404-trusty-64-minimal sshd\[20793\]: Failed password for invalid user testftp from 188.166.23.215 port 36120 ssh2 Apr 23 00:01:54 Ubuntu-1404-trusty-64-minimal sshd\[4345\]: Invalid user sftpuser from 188.166.23.215 Apr 23 00:01:54 Ubuntu-1404-trusty-64-minimal sshd\[4345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.23.215 | 2020-04-23 07:02:30 | 
| 163.172.118.125 | attack | SASL PLAIN auth failed: ruser=... | 2020-04-23 06:58:13 | 
| 67.140.142.19 | attack | 23/tcp [2020-04-22]1pkt | 2020-04-23 07:03:55 | 
| 222.186.30.76 | attackspam | Apr 22 19:14:14 plusreed sshd[28432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76 user=root Apr 22 19:14:16 plusreed sshd[28432]: Failed password for root from 222.186.30.76 port 48515 ssh2 ... | 2020-04-23 07:16:27 | 
| 222.186.52.78 | attack | Apr 23 00:15:28 * sshd[26625]: Failed password for root from 222.186.52.78 port 13123 ssh2 | 2020-04-23 06:59:12 | 
| 118.25.133.121 | attackbots | SSH Bruteforce attack | 2020-04-23 07:08:56 | 
| 58.49.116.78 | attack | proto=tcp . spt=32967 . dpt=25 . Found on Blocklist de (394) | 2020-04-23 07:02:56 | 
| 67.205.167.193 | attackspambots | Invalid user admin from 67.205.167.193 port 57598 | 2020-04-23 07:20:48 | 
| 49.234.207.226 | attack | Invalid user test from 49.234.207.226 port 39476 | 2020-04-23 07:19:50 |