City: Schrobenhausen
Region: Bavaria
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.92.64.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38203
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;217.92.64.5. IN A
;; AUTHORITY SECTION:
. 277 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022012301 1800 900 604800 86400
;; Query time: 504 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 24 01:35:38 CST 2022
;; MSG SIZE rcvd: 104
5.64.92.217.in-addr.arpa domain name pointer pd95c4005.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
5.64.92.217.in-addr.arpa name = pd95c4005.dip0.t-ipconnect.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
193.112.143.141 | attackspambots | Apr 2 15:41:34 silence02 sshd[15298]: Failed password for root from 193.112.143.141 port 54852 ssh2 Apr 2 15:44:06 silence02 sshd[15465]: Failed password for root from 193.112.143.141 port 53548 ssh2 |
2020-04-02 22:16:07 |
54.37.20.138 | attackspam | SSH Brute-Forcing (server2) |
2020-04-02 22:33:40 |
104.236.17.60 | attackbotsspam | Attempted connection to port 61756. |
2020-04-02 23:02:10 |
159.89.164.199 | attack | serveres are UTC Lines containing failures of 159.89.164.199 Mar 31 20:07:01 tux2 sshd[19537]: Failed password for r.r from 159.89.164.199 port 34988 ssh2 Mar 31 20:07:01 tux2 sshd[19537]: Received disconnect from 159.89.164.199 port 34988:11: Bye Bye [preauth] Mar 31 20:07:01 tux2 sshd[19537]: Disconnected from authenticating user r.r 159.89.164.199 port 34988 [preauth] Mar 31 20:21:51 tux2 sshd[20566]: Invalid user tc from 159.89.164.199 port 35118 Mar 31 20:21:51 tux2 sshd[20566]: Failed password for invalid user tc from 159.89.164.199 port 35118 ssh2 Mar 31 20:21:51 tux2 sshd[20566]: Received disconnect from 159.89.164.199 port 35118:11: Bye Bye [preauth] Mar 31 20:21:51 tux2 sshd[20566]: Disconnected from invalid user tc 159.89.164.199 port 35118 [preauth] Mar 31 20:26:41 tux2 sshd[20913]: Failed password for r.r from 159.89.164.199 port 57000 ssh2 Mar 31 20:26:41 tux2 sshd[20913]: Received disconnect from 159.89.164.199 port 57000:11: Bye Bye [preauth] Mar 31 20:2........ ------------------------------ |
2020-04-02 22:41:55 |
137.74.165.57 | attack | Attempted connection to port 55704. |
2020-04-02 22:21:20 |
167.114.251.107 | attack | Tried sshing with brute force. |
2020-04-02 22:51:00 |
185.238.74.26 | attackspambots | $f2bV_matches |
2020-04-02 23:19:10 |
1.173.45.243 | attackbotsspam | Attempted connection to port 23. |
2020-04-02 23:15:11 |
94.191.8.199 | attack | fail2ban -- 94.191.8.199 ... |
2020-04-02 22:52:29 |
179.185.89.232 | attack | Apr 2 09:28:04 ny01 sshd[28302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.89.232 Apr 2 09:28:06 ny01 sshd[28302]: Failed password for invalid user yx from 179.185.89.232 port 41812 ssh2 Apr 2 09:33:18 ny01 sshd[28795]: Failed password for root from 179.185.89.232 port 52196 ssh2 |
2020-04-02 22:55:12 |
120.79.133.78 | attackbotsspam | Attempted connection to ports 6380, 8088. |
2020-04-02 22:28:54 |
112.85.42.194 | attack | Apr 2 17:09:39 ift sshd\[56477\]: Failed password for root from 112.85.42.194 port 29928 ssh2Apr 2 17:09:41 ift sshd\[56477\]: Failed password for root from 112.85.42.194 port 29928 ssh2Apr 2 17:09:44 ift sshd\[56477\]: Failed password for root from 112.85.42.194 port 29928 ssh2Apr 2 17:17:30 ift sshd\[57991\]: Failed password for root from 112.85.42.194 port 38440 ssh2Apr 2 17:17:33 ift sshd\[57991\]: Failed password for root from 112.85.42.194 port 38440 ssh2 ... |
2020-04-02 22:56:10 |
104.248.163.59 | attack | Attempted connection to port 10773. |
2020-04-02 22:58:37 |
14.248.83.92 | attack | Attempted connection to port 5555. |
2020-04-02 22:18:06 |
202.27.209.237 | attack | port scan and connect, tcp 8080 (http-proxy) |
2020-04-02 23:05:57 |