City: unknown
Region: unknown
Country: Egypt
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.44.219.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.44.219.89. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 13:42:31 CST 2025
;; MSG SIZE rcvd: 105
89.219.44.41.in-addr.arpa domain name pointer host-41.44.219.89.tedata.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
89.219.44.41.in-addr.arpa name = host-41.44.219.89.tedata.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 188.254.0.224 | attackbots | Sep 27 21:56:18 lnxmysql61 sshd[32221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.224 |
2019-09-28 04:12:40 |
| 179.182.182.104 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:53. |
2019-09-28 04:23:54 |
| 147.135.210.187 | attackspam | Sep 27 17:39:09 rotator sshd\[31570\]: Invalid user sonny from 147.135.210.187Sep 27 17:39:11 rotator sshd\[31570\]: Failed password for invalid user sonny from 147.135.210.187 port 48328 ssh2Sep 27 17:43:40 rotator sshd\[32380\]: Invalid user damar from 147.135.210.187Sep 27 17:43:41 rotator sshd\[32380\]: Failed password for invalid user damar from 147.135.210.187 port 60716 ssh2Sep 27 17:48:04 rotator sshd\[706\]: Invalid user jenghan from 147.135.210.187Sep 27 17:48:07 rotator sshd\[706\]: Failed password for invalid user jenghan from 147.135.210.187 port 44876 ssh2 ... |
2019-09-28 04:27:12 |
| 198.108.67.109 | attack | firewall-block, port(s): 9017/tcp |
2019-09-28 04:25:06 |
| 190.85.108.186 | attack | Sep 27 15:06:48 bouncer sshd\[23208\]: Invalid user password from 190.85.108.186 port 57314 Sep 27 15:06:48 bouncer sshd\[23208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.108.186 Sep 27 15:06:51 bouncer sshd\[23208\]: Failed password for invalid user password from 190.85.108.186 port 57314 ssh2 ... |
2019-09-28 04:33:50 |
| 103.199.145.82 | attack | Sep 27 22:17:51 ns41 sshd[6901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.199.145.82 |
2019-09-28 04:21:38 |
| 183.82.56.25 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:57. |
2019-09-28 04:17:31 |
| 180.248.121.99 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:55. |
2019-09-28 04:20:27 |
| 185.117.146.144 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:58. |
2019-09-28 04:15:39 |
| 177.184.135.94 | attackbotsspam | Unauthorized connection attempt from IP address 177.184.135.94 on Port 445(SMB) |
2019-09-28 04:28:59 |
| 150.129.60.229 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:45. |
2019-09-28 04:33:32 |
| 14.229.108.89 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:43. |
2019-09-28 04:36:06 |
| 176.36.208.138 | attack | RDP Brute-Force (Grieskirchen RZ1) |
2019-09-28 04:40:26 |
| 106.13.6.113 | attack | 2019-09-27T14:21:48.3047391495-001 sshd\[3532\]: Failed password for invalid user ny from 106.13.6.113 port 44770 ssh2 2019-09-27T14:36:20.5646341495-001 sshd\[5041\]: Invalid user owncloud from 106.13.6.113 port 56302 2019-09-27T14:36:20.5760171495-001 sshd\[5041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.113 2019-09-27T14:36:22.4138371495-001 sshd\[5041\]: Failed password for invalid user owncloud from 106.13.6.113 port 56302 ssh2 2019-09-27T14:40:58.9162381495-001 sshd\[5498\]: Invalid user aguero from 106.13.6.113 port 60132 2019-09-27T14:40:58.9252361495-001 sshd\[5498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.113 ... |
2019-09-28 04:28:23 |
| 180.190.40.105 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:05:54. |
2019-09-28 04:22:14 |