City: Uslar
Region: Lower Saxony
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: Deutsche Telekom AG
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2003:da:43e5:d900:4c92:8089:5254:79c2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18555
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2003:da:43e5:d900:4c92:8089:5254:79c2. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019071100 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 12 01:23:02 CST 2019
;; MSG SIZE rcvd: 141
2.c.9.7.4.5.2.5.9.8.0.8.2.9.c.4.0.0.9.d.5.e.3.4.a.d.0.0.3.0.0.2.ip6.arpa domain name pointer p200300DA43E5D9004C928089525479C2.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.c.9.7.4.5.2.5.9.8.0.8.2.9.c.4.0.0.9.d.5.e.3.4.a.d.0.0.3.0.0.2.ip6.arpa name = p200300DA43E5D9004C928089525479C2.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.42.173.80 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 19-12-2019 15:05:15. |
2019-12-20 02:36:48 |
| 80.213.194.56 | attackspam | $f2bV_matches |
2019-12-20 02:37:36 |
| 201.93.159.10 | attackspambots | Dec 19 19:54:31 MK-Soft-VM6 sshd[20583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.93.159.10 Dec 19 19:54:33 MK-Soft-VM6 sshd[20583]: Failed password for invalid user admin from 201.93.159.10 port 64032 ssh2 ... |
2019-12-20 02:56:21 |
| 119.29.152.172 | attack | Dec 20 01:47:28 webhost01 sshd[21015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.152.172 Dec 20 01:47:30 webhost01 sshd[21015]: Failed password for invalid user apache from 119.29.152.172 port 43280 ssh2 ... |
2019-12-20 03:07:44 |
| 182.156.209.222 | attackbots | $f2bV_matches |
2019-12-20 02:45:51 |
| 103.92.204.20 | attackbotsspam | TCP Port: 25 invalid blocked abuseat-org also barracuda and zen-spamhaus (747) |
2019-12-20 02:42:55 |
| 45.146.201.162 | attackspam | Postfix DNSBL listed. Trying to send SPAM. |
2019-12-20 02:41:42 |
| 159.89.160.91 | attack | " " |
2019-12-20 02:33:29 |
| 218.253.193.235 | attackspam | Dec 19 16:47:10 srv206 sshd[19771]: Invalid user khalijah from 218.253.193.235 Dec 19 16:47:10 srv206 sshd[19771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.193.235 Dec 19 16:47:10 srv206 sshd[19771]: Invalid user khalijah from 218.253.193.235 Dec 19 16:47:12 srv206 sshd[19771]: Failed password for invalid user khalijah from 218.253.193.235 port 34720 ssh2 ... |
2019-12-20 02:37:51 |
| 69.94.136.241 | attackbotsspam | Dec 19 16:40:16 grey postfix/smtpd\[5613\]: NOQUEUE: reject: RCPT from chubby.kwyali.com\[69.94.136.241\]: 554 5.7.1 Service unavailable\; Client host \[69.94.136.241\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.136.241\]\; from=\ |
2019-12-20 02:34:07 |
| 180.169.194.38 | attackspambots | Dec 19 19:54:29 lnxmail61 sshd[5908]: Failed password for mysql from 180.169.194.38 port 2445 ssh2 Dec 19 19:54:29 lnxmail61 sshd[5908]: Failed password for mysql from 180.169.194.38 port 2445 ssh2 Dec 19 20:00:26 lnxmail61 sshd[7449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.169.194.38 |
2019-12-20 03:05:29 |
| 129.204.94.81 | attackspam | Dec 19 16:14:21 ns3042688 sshd\[23730\]: Invalid user www from 129.204.94.81 Dec 19 16:14:21 ns3042688 sshd\[23730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.94.81 Dec 19 16:14:23 ns3042688 sshd\[23730\]: Failed password for invalid user www from 129.204.94.81 port 44949 ssh2 Dec 19 16:22:16 ns3042688 sshd\[27460\]: Invalid user ident from 129.204.94.81 Dec 19 16:22:16 ns3042688 sshd\[27460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.94.81 ... |
2019-12-20 03:04:10 |
| 157.230.119.200 | attack | Dec 19 19:46:29 * sshd[20574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.119.200 Dec 19 19:46:31 * sshd[20574]: Failed password for invalid user addroot from 157.230.119.200 port 51386 ssh2 |
2019-12-20 03:03:52 |
| 58.221.60.49 | attackbotsspam | Invalid user host from 58.221.60.49 port 36179 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.60.49 Failed password for invalid user host from 58.221.60.49 port 36179 ssh2 Invalid user kwanise from 58.221.60.49 port 33125 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.60.49 |
2019-12-20 03:02:56 |
| 139.59.211.245 | attackbots | $f2bV_matches |
2019-12-20 02:39:52 |