City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.4.196.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26437
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.4.196.161. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:19:41 CST 2025
;; MSG SIZE rcvd: 105
161.196.4.46.in-addr.arpa domain name pointer static.161.196.4.46.clients.your-server.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
161.196.4.46.in-addr.arpa name = static.161.196.4.46.clients.your-server.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.86.164.106 | attackspambots | Automatic report - Banned IP Access |
2020-01-20 16:01:14 |
| 87.81.169.74 | attack | Invalid user carlos from 87.81.169.74 port 55132 |
2020-01-20 15:45:53 |
| 110.137.159.66 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 20-01-2020 04:55:09. |
2020-01-20 15:54:24 |
| 159.203.197.148 | attack | Web application attack detected by fail2ban |
2020-01-20 15:57:37 |
| 138.197.195.52 | attackspambots | Unauthorized connection attempt detected from IP address 138.197.195.52 to port 2220 [J] |
2020-01-20 15:56:27 |
| 162.243.164.246 | attackspam | Unauthorized connection attempt detected from IP address 162.243.164.246 to port 2220 [J] |
2020-01-20 15:39:57 |
| 128.14.133.58 | attack | Unauthorized connection attempt detected from IP address 128.14.133.58 to port 443 [J] |
2020-01-20 16:00:26 |
| 185.244.39.209 | attackspam | 2020-01-20T07:49:08.465601hub.schaetter.us sshd\[382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.39.209 user=root 2020-01-20T07:49:10.093933hub.schaetter.us sshd\[382\]: Failed password for root from 185.244.39.209 port 33536 ssh2 2020-01-20T07:49:11.217372hub.schaetter.us sshd\[384\]: Invalid user admin from 185.244.39.209 port 35482 2020-01-20T07:49:11.225020hub.schaetter.us sshd\[384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.39.209 2020-01-20T07:49:12.597568hub.schaetter.us sshd\[384\]: Failed password for invalid user admin from 185.244.39.209 port 35482 ssh2 ... |
2020-01-20 16:16:09 |
| 112.175.184.45 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-01-20 16:03:26 |
| 104.248.117.234 | attack | Unauthorized connection attempt detected from IP address 104.248.117.234 to port 2220 [J] |
2020-01-20 15:58:40 |
| 222.186.173.180 | attackbotsspam | Jan 19 21:36:43 hpm sshd\[17096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root Jan 19 21:36:45 hpm sshd\[17096\]: Failed password for root from 222.186.173.180 port 39990 ssh2 Jan 19 21:37:01 hpm sshd\[17125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root Jan 19 21:37:03 hpm sshd\[17125\]: Failed password for root from 222.186.173.180 port 61786 ssh2 Jan 19 21:37:21 hpm sshd\[17147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root |
2020-01-20 15:47:52 |
| 13.68.137.194 | attackbots | Jan 20 09:08:02 amit sshd\[394\]: Invalid user testor from 13.68.137.194 Jan 20 09:08:02 amit sshd\[394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.137.194 Jan 20 09:08:04 amit sshd\[394\]: Failed password for invalid user testor from 13.68.137.194 port 38304 ssh2 ... |
2020-01-20 16:10:25 |
| 141.210.55.69 | attack | SSH/22 MH Probe, BF, Hack - |
2020-01-20 16:05:54 |
| 218.92.0.138 | attack | Jan 20 09:03:32 ks10 sshd[2918142]: Failed password for root from 218.92.0.138 port 7352 ssh2 Jan 20 09:03:36 ks10 sshd[2918142]: Failed password for root from 218.92.0.138 port 7352 ssh2 ... |
2020-01-20 16:20:51 |
| 186.4.242.37 | attackspambots | Jan 20 09:14:10 vps691689 sshd[27039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.242.37 Jan 20 09:14:12 vps691689 sshd[27039]: Failed password for invalid user suporte from 186.4.242.37 port 35046 ssh2 Jan 20 09:17:15 vps691689 sshd[27170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.242.37 ... |
2020-01-20 16:17:47 |