City: Oldenburg
Region: Lower Saxony
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.182.104.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.182.104.141. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020100201 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 03 02:28:31 CST 2020
;; MSG SIZE rcvd: 119
141.104.182.213.in-addr.arpa domain name pointer dyndsl-213-182-104-141-teleos.ewe-ip-backbone.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
141.104.182.213.in-addr.arpa name = dyndsl-213-182-104-141-teleos.ewe-ip-backbone.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.98.87.143 | attackbots | firewall-block, port(s): 3398/tcp |
2020-03-25 18:41:43 |
61.244.196.102 | attackbots | Automatically reported by fail2ban report script (mx1) |
2020-03-25 18:25:53 |
45.184.24.5 | attackbotsspam | Mar 25 06:58:55 SilenceServices sshd[24192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.24.5 Mar 25 06:58:57 SilenceServices sshd[24192]: Failed password for invalid user router from 45.184.24.5 port 49938 ssh2 Mar 25 07:03:21 SilenceServices sshd[6361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.24.5 |
2020-03-25 18:23:19 |
187.38.26.173 | attack | Invalid user debian from 187.38.26.173 port 55431 |
2020-03-25 18:21:39 |
192.241.237.155 | attack | Port 5351 scan denied |
2020-03-25 18:36:18 |
195.3.146.114 | attackbots | Port 1723 scan denied |
2020-03-25 19:20:22 |
198.108.66.233 | attackspam | Port 8036 scan denied |
2020-03-25 19:18:14 |
106.13.13.188 | attackbotsspam | Invalid user uw from 106.13.13.188 port 59270 |
2020-03-25 18:22:11 |
87.251.74.14 | attackspam | Port 1240 scan denied |
2020-03-25 18:53:27 |
159.89.169.125 | attackbots | $f2bV_matches |
2020-03-25 18:26:23 |
92.53.65.247 | attackbots | 360 packets to ports 3370 3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3390 3391 3392 3393 3394 3395 3396 3397 3398 3399 3400 3401 3402 3403 3404 3405 3406 3407 3408 3409 3410 |
2020-03-25 18:52:01 |
185.143.221.46 | attackspambots | Port 22192 scan denied |
2020-03-25 18:39:12 |
198.108.66.230 | attackspam | 8057/tcp 9267/tcp 9252/tcp... [2020-01-25/03-25]106pkt,102pt.(tcp),1pt.(udp) |
2020-03-25 19:19:02 |
194.26.29.113 | attack | Mar 25 12:16:42 debian-2gb-nbg1-2 kernel: \[7394082.677883\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=43467 PROTO=TCP SPT=50151 DPT=2337 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-25 19:22:05 |
195.231.0.193 | attack | " " |
2020-03-25 18:31:20 |