City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.13.29.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43485
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;49.13.29.17. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 16:47:21 CST 2025
;; MSG SIZE rcvd: 104
17.29.13.49.in-addr.arpa domain name pointer static.17.29.13.49.clients.your-server.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
17.29.13.49.in-addr.arpa name = static.17.29.13.49.clients.your-server.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 189.228.168.92 | attackbots | Automatic report - Port Scan Attack |
2019-10-02 00:38:04 |
| 114.86.243.170 | attack | Oct 1 15:14:49 www5 sshd\[26573\]: Invalid user tests from 114.86.243.170 Oct 1 15:14:49 www5 sshd\[26573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.86.243.170 Oct 1 15:14:51 www5 sshd\[26573\]: Failed password for invalid user tests from 114.86.243.170 port 2112 ssh2 ... |
2019-10-02 00:07:48 |
| 181.29.21.191 | attack | Oct 1 09:26:41 TORMINT sshd\[26637\]: Invalid user box1 from 181.29.21.191 Oct 1 09:26:41 TORMINT sshd\[26637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.29.21.191 Oct 1 09:26:43 TORMINT sshd\[26637\]: Failed password for invalid user box1 from 181.29.21.191 port 50632 ssh2 ... |
2019-10-01 23:59:15 |
| 218.21.254.3 | attackbotsspam | Chat Spam |
2019-10-02 00:33:35 |
| 117.0.35.153 | attack | Oct 1 15:48:35 hcbbdb sshd\[22181\]: Invalid user admin from 117.0.35.153 Oct 1 15:48:35 hcbbdb sshd\[22181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153 Oct 1 15:48:36 hcbbdb sshd\[22181\]: Failed password for invalid user admin from 117.0.35.153 port 57255 ssh2 Oct 1 15:48:39 hcbbdb sshd\[22192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153 user=root Oct 1 15:48:42 hcbbdb sshd\[22192\]: Failed password for root from 117.0.35.153 port 55814 ssh2 |
2019-10-02 00:23:22 |
| 40.84.156.61 | attack | Oct 1 18:01:24 MK-Soft-VM3 sshd[26518]: Failed password for bin from 40.84.156.61 port 42294 ssh2 ... |
2019-10-02 00:10:09 |
| 123.157.115.219 | attackbotsspam | Automated reporting of SSH Vulnerability scanning |
2019-10-01 23:52:05 |
| 145.255.21.29 | attackbotsspam | 2019-10-0114:14:291iFH2y-0007ao-SZ\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[5.62.136.71]:54634P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2784id=E65CE359-68A7-4D32-BE28-4D04F1A56FE9@imsuisse-sa.chT=""foramyremaxsilverman@yahoo.comanya_lee81@yahoo.comaquavargas@yahoo.combeckwheat3@aol.combidme10@aol.combluedramatic8@yahoo.combonnie3386@yahoo.combovella@cox.netbrandon_delgrosso@yahoo.comBredekimberly@yahoo.combruin2000@aol.comcaldrich7@aol.comcallen1942@gotsky.com2019-10-0114:14:291iFH2z-0007bU-2J\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[112.134.232.94]:45807P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2151id=52C24F30-9718-4AD3-B3D8-644F1A346494@imsuisse-sa.chT="Kayla"forkaylaakinlosose@yahoo.comjarvi00@aol.comkeiviacrane@yahoo.comkhelia_willis@yahoo.comkierra_lewis09@yahoo.comkindra3battles@hotmail.comkwill17@aol.comlakeishamiami@aol.com2019-10-0114:14:181iFH2o-0007ao-34\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\ |
2019-10-02 00:16:20 |
| 23.129.64.187 | attackspambots | Oct 1 17:45:47 rotator sshd\[19497\]: Failed password for root from 23.129.64.187 port 36331 ssh2Oct 1 17:45:50 rotator sshd\[19497\]: Failed password for root from 23.129.64.187 port 36331 ssh2Oct 1 17:45:53 rotator sshd\[19497\]: Failed password for root from 23.129.64.187 port 36331 ssh2Oct 1 17:45:56 rotator sshd\[19497\]: Failed password for root from 23.129.64.187 port 36331 ssh2Oct 1 17:45:59 rotator sshd\[19497\]: Failed password for root from 23.129.64.187 port 36331 ssh2Oct 1 17:46:02 rotator sshd\[19497\]: Failed password for root from 23.129.64.187 port 36331 ssh2 ... |
2019-10-02 00:19:40 |
| 211.141.56.168 | attackbots | Telnet Server BruteForce Attack |
2019-10-02 00:12:23 |
| 69.7.253.249 | attackspam | " " |
2019-10-02 00:26:32 |
| 52.192.249.155 | attack | Oct 1 17:38:39 vps691689 sshd[9191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.192.249.155 Oct 1 17:38:41 vps691689 sshd[9191]: Failed password for invalid user bank from 52.192.249.155 port 47689 ssh2 ... |
2019-10-01 23:52:59 |
| 110.78.81.18 | attackspam | 445/tcp 445/tcp 445/tcp... [2019-08-12/10-01]5pkt,1pt.(tcp) |
2019-10-02 00:36:48 |
| 91.132.145.224 | attackspambots | 2019-10-01T17:43:25.802839lon01.zurich-datacenter.net sshd\[13329\]: Invalid user suzanne from 91.132.145.224 port 43620 2019-10-01T17:43:25.812348lon01.zurich-datacenter.net sshd\[13329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v22019058398089531.nicesrv.de 2019-10-01T17:43:27.547307lon01.zurich-datacenter.net sshd\[13329\]: Failed password for invalid user suzanne from 91.132.145.224 port 43620 ssh2 2019-10-01T17:47:29.697579lon01.zurich-datacenter.net sshd\[13417\]: Invalid user html from 91.132.145.224 port 56616 2019-10-01T17:47:29.702818lon01.zurich-datacenter.net sshd\[13417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v22019058398089531.nicesrv.de ... |
2019-10-01 23:57:40 |
| 89.238.165.126 | attackspambots | 445/tcp 445/tcp [2019-09-20/10-01]2pkt |
2019-10-02 00:32:31 |