City: unknown
Region: unknown
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.90.12.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.90.12.189.			IN	A
;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011100 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 01:07:58 CST 2022
;; MSG SIZE  rcvd: 106189.12.90.213.in-addr.arpa domain name pointer r2p0701.at-1.netway.at.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
189.12.90.213.in-addr.arpa	name = r2p0701.at-1.netway.at.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 84.215.23.72 | attack | detected by Fail2Ban | 2020-04-10 01:16:32 | 
| 159.65.132.170 | attackbotsspam | Bruteforce detected by fail2ban | 2020-04-10 00:42:24 | 
| 217.133.58.148 | attack | Apr 9 15:42:02 meumeu sshd[17860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.58.148 Apr 9 15:42:04 meumeu sshd[17860]: Failed password for invalid user musikbot from 217.133.58.148 port 48786 ssh2 Apr 9 15:47:05 meumeu sshd[18585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.58.148 ... | 2020-04-10 01:10:50 | 
| 91.121.45.5 | attackspam | Apr 9 19:06:49 gw1 sshd[25491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.45.5 Apr 9 19:06:52 gw1 sshd[25491]: Failed password for invalid user admin from 91.121.45.5 port 16300 ssh2 ... | 2020-04-10 01:29:07 | 
| 185.201.24.29 | attackbotsspam | Unauthorized connection attempt from IP address 185.201.24.29 on Port 445(SMB) | 2020-04-10 01:32:43 | 
| 49.88.112.69 | attackspam | SSH brute force attempt @ 2020-04-09 18:34:17 | 2020-04-10 01:34:58 | 
| 122.51.213.140 | attackspam | (sshd) Failed SSH login from 122.51.213.140 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 9 16:46:27 srv sshd[19738]: Invalid user coin from 122.51.213.140 port 53768 Apr 9 16:46:29 srv sshd[19738]: Failed password for invalid user coin from 122.51.213.140 port 53768 ssh2 Apr 9 16:58:18 srv sshd[20904]: Invalid user ubuntu from 122.51.213.140 port 47368 Apr 9 16:58:21 srv sshd[20904]: Failed password for invalid user ubuntu from 122.51.213.140 port 47368 ssh2 Apr 9 17:02:09 srv sshd[21294]: Invalid user aticara from 122.51.213.140 port 57490 | 2020-04-10 01:26:43 | 
| 188.136.204.233 | attackbotsspam | Automatic report - Port Scan Attack | 2020-04-10 01:04:23 | 
| 197.47.162.233 | attack | Unauthorized connection attempt from IP address 197.47.162.233 on Port 445(SMB) | 2020-04-10 01:09:08 | 
| 92.45.61.74 | attack | Unauthorized connection attempt from IP address 92.45.61.74 on Port 445(SMB) | 2020-04-10 01:03:17 | 
| 52.66.222.63 | attackbots | $f2bV_matches | 2020-04-10 01:28:36 | 
| 106.1.94.78 | attack | Apr 9 18:16:17 vserver sshd\[32023\]: Invalid user admin from 106.1.94.78Apr 9 18:16:19 vserver sshd\[32023\]: Failed password for invalid user admin from 106.1.94.78 port 39764 ssh2Apr 9 18:25:01 vserver sshd\[32116\]: Invalid user wp from 106.1.94.78Apr 9 18:25:03 vserver sshd\[32116\]: Failed password for invalid user wp from 106.1.94.78 port 43012 ssh2 ... | 2020-04-10 01:18:17 | 
| 193.242.195.222 | attackspam | Unauthorized connection attempt from IP address 193.242.195.222 on Port 445(SMB) | 2020-04-10 00:55:45 | 
| 51.83.66.171 | attackbotsspam | Unauthorized connection attempt from IP address 51.83.66.171 on Port 445(SMB) | 2020-04-10 00:51:24 | 
| 77.232.100.131 | attack | Lines containing failures of 77.232.100.131 (max 1000) Apr 8 17:14:00 mxbb sshd[9936]: Invalid user monhostnameor from 77.232.100.131 port 55924 Apr 8 17:14:00 mxbb sshd[9936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.100.131 Apr 8 17:14:02 mxbb sshd[9936]: Failed password for invalid user monhostnameor from 77.232.100.131 port 55924 ssh2 Apr 8 17:14:02 mxbb sshd[9936]: Received disconnect from 77.232.100.131 port 55924:11: Bye Bye [preauth] Apr 8 17:14:02 mxbb sshd[9936]: Disconnected from 77.232.100.131 port 55924 [preauth] Apr 8 17:19:52 mxbb sshd[10069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.100.131 user=r.r Apr 8 17:19:55 mxbb sshd[10069]: Failed password for r.r from 77.232.100.131 port 42342 ssh2 Apr 8 17:19:55 mxbb sshd[10069]: Received disconnect from 77.232.100.131 port 42342:11: Bye Bye [preauth] Apr 8 17:19:55 mxbb sshd[10069]: Disconnected........ ------------------------------ | 2020-04-10 01:10:24 |