City: unknown
Region: unknown
Country: Spain
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.96.38.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32832
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.96.38.29. IN A
;; AUTHORITY SECTION:
. 108 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022041200 1800 900 604800 86400
;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 12 21:36:07 CST 2022
;; MSG SIZE rcvd: 105
29.38.96.213.in-addr.arpa domain name pointer 29.red-213-96-38.staticip.rima-tde.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.38.96.213.in-addr.arpa name = 29.red-213-96-38.staticip.rima-tde.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
118.244.196.89 | attackspambots | Aug 6 23:45:07 MK-Soft-Root2 sshd\[26853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.196.89 user=root Aug 6 23:45:09 MK-Soft-Root2 sshd\[26853\]: Failed password for root from 118.244.196.89 port 56536 ssh2 Aug 6 23:50:01 MK-Soft-Root2 sshd\[27485\]: Invalid user csgo-server from 118.244.196.89 port 48597 Aug 6 23:50:01 MK-Soft-Root2 sshd\[27485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.196.89 ... |
2019-08-07 06:24:01 |
31.7.5.58 | attackspambots | CloudCIX Reconnaissance Scan Detected, PTR: hosted.by.shockmedia.nl. |
2019-08-07 06:06:02 |
218.219.246.124 | attackspam | Aug 6 23:50:42 icinga sshd[591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.219.246.124 Aug 6 23:50:44 icinga sshd[591]: Failed password for invalid user livesupport from 218.219.246.124 port 51186 ssh2 ... |
2019-08-07 05:51:54 |
190.57.167.67 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-06 21:02:35,353 INFO [shellcode_manager] (190.57.167.67) no match, writing hexdump (2ad11fc69c8bf45c45291a91fbcc9472 :1889543) - MS17010 (EternalBlue) |
2019-08-07 06:11:31 |
190.167.197.85 | attackspam | Honeypot attack, port: 445, PTR: 85.197.167.190.d.dyn.codetel.net.do. |
2019-08-07 05:42:56 |
202.131.242.154 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-06 20:20:29,033 INFO [amun_request_handler] PortScan Detected on Port: 445 (202.131.242.154) |
2019-08-07 05:51:20 |
112.133.208.187 | attackspambots | 06.08.2019 18:24:56 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter |
2019-08-07 05:50:14 |
173.249.59.104 | attackspambots | Aug 6 20:32:59 srv00 sshd[46208]: fatal: Unable to negotiate whostnameh 173.249.59.104 port 59922: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Aug 6 20:33:07 srv00 sshd[46222]: fatal: Unable to negotiate whostnameh 173.249.59.104 port 45336: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Aug 6 20:33:14 srv00 sshd[46225]: fatal: Unable to negotiate whostnameh 173.249.59.104 port 58972: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Aug 6 20:33:23 srv00 sshd[46227]: fatal: Unable to negotiate whostnameh 173.249.59.104 port 44376: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman........ ------------------------------ |
2019-08-07 06:18:17 |
181.169.102.19 | attackbots | Automatic report - SSH Brute-Force Attack |
2019-08-07 05:56:20 |
103.66.79.245 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-06 21:12:46,224 INFO [shellcode_manager] (103.66.79.245) no match, writing hexdump (cc4271b64fe06edccba4149eb014dc29 :1881051) - MS17010 (EternalBlue) |
2019-08-07 05:54:47 |
91.67.105.22 | attackspam | Aug 6 22:50:25 debian sshd\[26251\]: Invalid user crc from 91.67.105.22 port 4283 Aug 6 22:50:25 debian sshd\[26251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.67.105.22 ... |
2019-08-07 06:06:38 |
87.17.158.144 | attackbotsspam | Aug 6 21:59:28 xb0 sshd[31599]: Failed password for invalid user skkb from 87.17.158.144 port 54544 ssh2 Aug 6 21:59:28 xb0 sshd[31599]: Received disconnect from 87.17.158.144: 11: Bye Bye [preauth] Aug 6 22:00:55 xb0 sshd[23289]: Failed password for invalid user skkb from 87.17.158.144 port 42318 ssh2 Aug 6 22:00:55 xb0 sshd[23289]: Received disconnect from 87.17.158.144: 11: Bye Bye [preauth] Aug 6 22:11:46 xb0 sshd[21424]: Failed password for invalid user reagan from 87.17.158.144 port 48728 ssh2 Aug 6 22:11:46 xb0 sshd[21424]: Received disconnect from 87.17.158.144: 11: Bye Bye [preauth] Aug 6 22:12:19 xb0 sshd[24417]: Failed password for invalid user reagan from 87.17.158.144 port 54796 ssh2 Aug 6 22:12:19 xb0 sshd[24417]: Received disconnect from 87.17.158.144: 11: Bye Bye [preauth] Aug 6 22:17:44 xb0 sshd[22679]: Failed password for invalid user teodora from 87.17.158.144 port 46476 ssh2 Aug 6 22:17:44 xb0 sshd[22679]: Received disconnect from 87.17.158........ ------------------------------- |
2019-08-07 06:12:12 |
109.19.16.40 | attack | Aug 7 03:20:37 areeb-Workstation sshd\[1816\]: Invalid user justin1 from 109.19.16.40 Aug 7 03:20:37 areeb-Workstation sshd\[1816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.19.16.40 Aug 7 03:20:39 areeb-Workstation sshd\[1816\]: Failed password for invalid user justin1 from 109.19.16.40 port 56710 ssh2 ... |
2019-08-07 05:54:22 |
185.208.209.7 | attackspambots | 08/06/2019-17:50:37.233879 185.208.209.7 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-08-07 05:58:49 |
128.199.231.239 | attack | Aug 7 00:07:22 server sshd\[17643\]: Invalid user no1 from 128.199.231.239 port 41862 Aug 7 00:07:22 server sshd\[17643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.231.239 Aug 7 00:07:24 server sshd\[17643\]: Failed password for invalid user no1 from 128.199.231.239 port 41862 ssh2 Aug 7 00:16:18 server sshd\[5955\]: Invalid user am from 128.199.231.239 port 46944 Aug 7 00:16:18 server sshd\[5955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.231.239 |
2019-08-07 05:35:07 |