City: Frankfurt am Main
Region: Hessen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.2.104.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2219
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.2.104.130. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 09:54:59 CST 2025
;; MSG SIZE rcvd: 105
Host 130.104.2.50.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 130.104.2.50.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 203.195.133.17 | attack | Feb 8 15:07:47 roki sshd[17666]: Invalid user ups from 203.195.133.17 Feb 8 15:07:47 roki sshd[17666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.133.17 Feb 8 15:07:49 roki sshd[17666]: Failed password for invalid user ups from 203.195.133.17 port 38646 ssh2 Feb 8 15:30:56 roki sshd[20948]: Invalid user ezt from 203.195.133.17 Feb 8 15:30:56 roki sshd[20948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.133.17 ... |
2020-02-08 22:34:16 |
| 86.19.89.36 | attackbotsspam | 64068/udp [2020-02-08]1pkt |
2020-02-08 23:03:55 |
| 122.51.132.60 | attackbotsspam | $f2bV_matches |
2020-02-08 22:26:12 |
| 211.218.59.73 | attackspambots | 23/tcp [2020-02-08]1pkt |
2020-02-08 22:45:25 |
| 91.121.87.174 | attackbotsspam | SSH Login Bruteforce |
2020-02-08 22:40:44 |
| 176.217.227.110 | attackbotsspam | 8080/tcp [2020-02-08]1pkt |
2020-02-08 23:08:11 |
| 14.29.152.56 | attackspambots | ssh brute force |
2020-02-08 22:27:46 |
| 59.0.139.224 | attackbotsspam | Unauthorized connection attempt detected from IP address 59.0.139.224 to port 81 |
2020-02-08 22:29:20 |
| 90.192.222.163 | attackspam | MVPower DVR TV Shell Unauthenticated Command Execution Vulnerability |
2020-02-08 23:01:40 |
| 51.15.3.29 | attack | Automatic report - Port Scan Attack |
2020-02-08 23:06:10 |
| 5.101.0.209 | attack | ThinkPHP Remote Code Execution Vulnerability |
2020-02-08 23:02:01 |
| 112.85.42.176 | attackspam | Feb 8 15:30:46 MK-Soft-Root1 sshd[4269]: Failed password for root from 112.85.42.176 port 62126 ssh2 Feb 8 15:30:52 MK-Soft-Root1 sshd[4269]: Failed password for root from 112.85.42.176 port 62126 ssh2 ... |
2020-02-08 22:42:04 |
| 194.26.29.130 | attack | Feb 8 15:59:26 debian-2gb-nbg1-2 kernel: \[3433206.311786\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.130 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54110 PROTO=TCP SPT=8080 DPT=4002 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-08 23:04:58 |
| 87.103.87.119 | attackbotsspam | 1581172257 - 02/08/2020 15:30:57 Host: 87.103.87.119/87.103.87.119 Port: 8080 TCP Blocked |
2020-02-08 22:35:43 |
| 103.210.45.116 | attack | Unauthorized connection attempt from IP address 103.210.45.116 on Port 445(SMB) |
2020-02-08 22:58:55 |