City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.4.242.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.4.242.149. IN A
;; AUTHORITY SECTION:
. 532 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023011200 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 12 16:18:46 CST 2023
;; MSG SIZE rcvd: 105
149.242.4.46.in-addr.arpa domain name pointer static.149.242.4.46.clients.your-server.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.242.4.46.in-addr.arpa name = static.149.242.4.46.clients.your-server.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
103.102.141.61 | attack | DATE:2020-06-19 05:52:22, IP:103.102.141.61, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq) |
2020-06-19 20:12:38 |
212.244.23.144 | attackspambots | (PL/Poland/-) SMTP Bruteforcing attempts |
2020-06-19 20:14:03 |
116.101.54.6 | attackspam | xmlrpc attack |
2020-06-19 20:27:17 |
128.199.200.155 | attack | SSH login attempts. |
2020-06-19 19:56:13 |
111.229.70.97 | attackbotsspam | 2020-06-19T09:36:27+0200 Failed SSH Authentication/Brute Force Attack. (Server 5) |
2020-06-19 20:00:43 |
59.125.182.209 | attackspam | Invalid user user14 from 59.125.182.209 port 48731 |
2020-06-19 20:01:28 |
180.76.190.221 | attackbotsspam | Invalid user oracle from 180.76.190.221 port 33036 |
2020-06-19 20:00:01 |
47.94.1.121 | attackbotsspam | Jun 19 08:18:06 Host-KEWR-E sshd[18903]: Invalid user iris from 47.94.1.121 port 42340 ... |
2020-06-19 20:30:33 |
212.244.23.96 | attackbots | (PL/Poland/-) SMTP Bruteforcing attempts |
2020-06-19 20:05:25 |
45.95.168.145 | attack | 2020-06-19T07:17:58.729886morrigan.ad5gb.com sshd[1439617]: Disconnected from authenticating user root 45.95.168.145 port 35274 [preauth] 2020-06-19T07:18:06.740848morrigan.ad5gb.com sshd[1439724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.168.145 user=root 2020-06-19T07:18:08.664423morrigan.ad5gb.com sshd[1439724]: Failed password for root from 45.95.168.145 port 42740 ssh2 |
2020-06-19 20:28:00 |
59.145.221.103 | attackspambots | Invalid user liam from 59.145.221.103 port 49806 |
2020-06-19 20:09:46 |
103.113.90.141 | attackspam | 2020-06-19 07:15:03.345760-0500 localhost smtpd[92184]: NOQUEUE: reject: RCPT from unknown[103.113.90.141]: 554 5.7.1 Service unavailable; Client host [103.113.90.141] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-06-19 20:27:34 |
142.93.101.148 | attack | ... |
2020-06-19 20:33:05 |
220.161.81.131 | attack | Jun 19 14:14:46 eventyay sshd[14070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131 Jun 19 14:14:49 eventyay sshd[14070]: Failed password for invalid user venkat from 220.161.81.131 port 58788 ssh2 Jun 19 14:18:02 eventyay sshd[14199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131 ... |
2020-06-19 20:32:30 |
212.244.23.122 | attackspambots | (PL/Poland/-) SMTP Bruteforcing attempts |
2020-06-19 20:18:42 |