City: Dresden
Region: Saxony
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.65.16.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;217.65.16.14. IN A
;; AUTHORITY SECTION:
. 307 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2021123001 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 11:16:32 CST 2021
;; MSG SIZE rcvd: 105
14.16.65.217.in-addr.arpa domain name pointer 14.16.65.217.static.versanetonline.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.16.65.217.in-addr.arpa name = 14.16.65.217.static.versanetonline.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
2.139.220.30 | attack | 2020-05-05T02:03:15.005008linuxbox-skyline sshd[185809]: Invalid user pwrchute from 2.139.220.30 port 35462 ... |
2020-05-05 16:36:57 |
185.244.234.222 | attackspambots | Excessive Port-Scanning |
2020-05-05 16:33:34 |
84.235.3.1 | attack | 445/tcp [2020-05-05]1pkt |
2020-05-05 16:27:58 |
120.31.143.254 | attackbotsspam | $f2bV_matches |
2020-05-05 16:11:11 |
134.122.16.19 | attackbotsspam | Port scan(s) denied |
2020-05-05 16:10:33 |
222.186.42.7 | attack | 2020-05-05T06:22:58.330937vps773228.ovh.net sshd[11766]: Failed password for root from 222.186.42.7 port 50011 ssh2 2020-05-05T06:23:00.179706vps773228.ovh.net sshd[11766]: Failed password for root from 222.186.42.7 port 50011 ssh2 2020-05-05T06:23:02.853974vps773228.ovh.net sshd[11766]: Failed password for root from 222.186.42.7 port 50011 ssh2 2020-05-05T10:29:56.057029vps773228.ovh.net sshd[16969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7 user=root 2020-05-05T10:29:57.897301vps773228.ovh.net sshd[16969]: Failed password for root from 222.186.42.7 port 61509 ssh2 ... |
2020-05-05 16:37:41 |
112.21.191.10 | attackbots | $f2bV_matches |
2020-05-05 16:22:20 |
96.44.162.82 | attack | Rude login attack (78 tries in 1d) |
2020-05-05 16:26:15 |
60.191.226.18 | attack | DATE:2020-05-05 03:05:18, IP:60.191.226.18, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq) |
2020-05-05 16:46:39 |
85.208.213.24 | attackspam | fail2ban -- 85.208.213.24 ... |
2020-05-05 16:12:01 |
129.192.71.74 | attackbots | May 5 09:21:45 vpn01 sshd[23685]: Failed password for root from 129.192.71.74 port 48638 ssh2 ... |
2020-05-05 16:10:50 |
95.48.54.106 | attackspambots | $f2bV_matches |
2020-05-05 16:45:44 |
120.127.233.88 | attackspam | port scan and connect, tcp 22 (ssh) |
2020-05-05 16:19:24 |
59.26.212.234 | attackspambots | Honeypot attack, port: 81, PTR: PTR record not found |
2020-05-05 16:07:54 |
54.38.15.126 | attack | 2020-05-05T03:11:30.960212mail.thespaminator.com sshd[28635]: Invalid user www-data from 54.38.15.126 port 49446 2020-05-05T03:11:33.220025mail.thespaminator.com sshd[28635]: Failed password for invalid user www-data from 54.38.15.126 port 49446 ssh2 ... |
2020-05-05 16:20:04 |