City: Salzgitter
Region: Lower Saxony
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: Deutsche Telekom AG
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2003:de:3f3c:4b39:cda4:6a00:e49c:15a3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44942
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2003:de:3f3c:4b39:cda4:6a00:e49c:15a3. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019071400 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 15 03:04:04 CST 2019
;; MSG SIZE rcvd: 141
3.a.5.1.c.9.4.e.0.0.a.6.4.a.d.c.9.3.b.4.c.3.f.3.e.d.0.0.3.0.0.2.ip6.arpa domain name pointer p200300DE3F3C4B39CDA46A00E49C15A3.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
3.a.5.1.c.9.4.e.0.0.a.6.4.a.d.c.9.3.b.4.c.3.f.3.e.d.0.0.3.0.0.2.ip6.arpa name = p200300DE3F3C4B39CDA46A00E49C15A3.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 129.204.86.44 | attack | Feb 16 04:22:06 hpm sshd\[5823\]: Invalid user violetta from 129.204.86.44 Feb 16 04:22:06 hpm sshd\[5823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.86.44 Feb 16 04:22:08 hpm sshd\[5823\]: Failed password for invalid user violetta from 129.204.86.44 port 45568 ssh2 Feb 16 04:26:54 hpm sshd\[6298\]: Invalid user cacti from 129.204.86.44 Feb 16 04:26:54 hpm sshd\[6298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.86.44 |
2020-02-16 22:29:39 |
| 197.58.96.114 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:29. |
2020-02-16 22:35:17 |
| 185.112.250.250 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-16 23:09:55 |
| 129.211.125.143 | attackbotsspam | Feb 16 15:56:53 mout sshd[17878]: Invalid user tatiana from 129.211.125.143 port 54838 |
2020-02-16 23:10:31 |
| 182.53.104.92 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:24. |
2020-02-16 22:45:56 |
| 117.218.182.114 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:19. |
2020-02-16 22:56:17 |
| 89.113.127.226 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:32. |
2020-02-16 22:28:36 |
| 138.0.55.194 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:21. |
2020-02-16 22:52:12 |
| 95.81.84.215 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:33. |
2020-02-16 22:26:23 |
| 5.39.86.52 | attackbotsspam | $f2bV_matches |
2020-02-16 23:00:52 |
| 104.229.203.202 | attack | Feb 16 16:26:39 server sshd\[2009\]: Invalid user freund from 104.229.203.202 Feb 16 16:26:39 server sshd\[2009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-104-229-203-202.twcny.res.rr.com Feb 16 16:26:41 server sshd\[2009\]: Failed password for invalid user freund from 104.229.203.202 port 58540 ssh2 Feb 16 16:50:21 server sshd\[6259\]: Invalid user mailsite from 104.229.203.202 Feb 16 16:50:21 server sshd\[6259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-104-229-203-202.twcny.res.rr.com ... |
2020-02-16 22:50:24 |
| 185.115.9.233 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-16 22:41:19 |
| 144.217.42.212 | attackbotsspam | Feb 16 14:50:13 localhost sshd\[18179\]: Invalid user pi from 144.217.42.212 Feb 16 14:50:13 localhost sshd\[18179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.42.212 Feb 16 14:50:15 localhost sshd\[18179\]: Failed password for invalid user pi from 144.217.42.212 port 43022 ssh2 Feb 16 14:50:18 localhost sshd\[18183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.42.212 user=root Feb 16 14:50:20 localhost sshd\[18183\]: Failed password for root from 144.217.42.212 port 44140 ssh2 ... |
2020-02-16 22:54:20 |
| 138.68.105.194 | attackspam | Feb 16 15:00:53 srv01 sshd[10632]: Invalid user ax from 138.68.105.194 port 55834 Feb 16 15:00:53 srv01 sshd[10632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.105.194 Feb 16 15:00:53 srv01 sshd[10632]: Invalid user ax from 138.68.105.194 port 55834 Feb 16 15:00:55 srv01 sshd[10632]: Failed password for invalid user ax from 138.68.105.194 port 55834 ssh2 Feb 16 15:07:04 srv01 sshd[11079]: Invalid user yun from 138.68.105.194 port 40324 ... |
2020-02-16 22:32:48 |
| 45.152.6.58 | attack | Unauthorised access (Feb 16) SRC=45.152.6.58 LEN=40 TTL=237 ID=59100 TCP DPT=8080 WINDOW=1024 SYN |
2020-02-16 22:40:01 |