City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.210.205.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.210.205.129.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:14:27 CST 2025
;; MSG SIZE  rcvd: 107129.205.210.81.in-addr.arpa domain name pointer ip-081-210-205-129.um21.pools.vodafone-ip.de.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
129.205.210.81.in-addr.arpa	name = ip-081-210-205-129.um21.pools.vodafone-ip.de.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 194.26.29.25 | attack | Jun 7 11:20:44 debian-2gb-nbg1-2 kernel: \[13780388.818649\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.25 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=53370 PROTO=TCP SPT=57864 DPT=11411 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-06-07 17:30:08 | 
| 47.204.232.28 | attackbotsspam | Scanning an empty webserver with deny all robots.txt | 2020-06-07 17:49:44 | 
| 111.230.210.229 | attack | SSH invalid-user multiple login try | 2020-06-07 17:44:06 | 
| 51.68.213.145 | attack | (mod_security) mod_security (id:210492) triggered by 51.68.213.145 (FR/France/vps-97fda435.vps.ovh.net): 5 in the last 300 secs | 2020-06-07 17:53:05 | 
| 142.93.34.237 | attackspam | $f2bV_matches | 2020-06-07 17:14:07 | 
| 37.21.52.195 | attackbots | Fail2Ban Ban Triggered HTTP SQL Injection Attempt | 2020-06-07 17:27:13 | 
| 123.206.62.112 | attack | Jun 7 05:40:09 nas sshd[22219]: Failed password for root from 123.206.62.112 port 58872 ssh2 Jun 7 05:44:58 nas sshd[22306]: Failed password for root from 123.206.62.112 port 53678 ssh2 ... | 2020-06-07 17:30:27 | 
| 120.31.205.203 | attackbots | Automatic report - Windows Brute-Force Attack | 2020-06-07 17:49:11 | 
| 122.51.197.3 | attack | Jun 7 03:45:34 124388 sshd[30885]: Failed password for root from 122.51.197.3 port 36168 ssh2 Jun 7 03:48:01 124388 sshd[31038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.197.3 user=root Jun 7 03:48:03 124388 sshd[31038]: Failed password for root from 122.51.197.3 port 34714 ssh2 Jun 7 03:50:24 124388 sshd[31087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.197.3 user=root Jun 7 03:50:27 124388 sshd[31087]: Failed password for root from 122.51.197.3 port 33262 ssh2 | 2020-06-07 17:22:58 | 
| 27.128.162.183 | attackspambots | Jun 7 05:46:57 minden010 sshd[31433]: Failed password for root from 27.128.162.183 port 43336 ssh2 Jun 7 05:48:26 minden010 sshd[31931]: Failed password for root from 27.128.162.183 port 52252 ssh2 ... | 2020-06-07 17:37:38 | 
| 106.13.90.133 | attackspam | 2020-06-06T13:49:43.532384devel sshd[13023]: Failed password for root from 106.13.90.133 port 50160 ssh2 2020-06-07T05:03:37.909305devel sshd[15621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.90.133 user=root 2020-06-07T05:03:39.633356devel sshd[15621]: Failed password for root from 106.13.90.133 port 54578 ssh2 | 2020-06-07 17:14:24 | 
| 95.179.127.82 | attackspambots | Fail2Ban Ban Triggered HTTP SQL Injection Attempt | 2020-06-07 17:15:28 | 
| 103.254.198.67 | attackbots | " " | 2020-06-07 17:52:22 | 
| 189.202.204.230 | attackspam | $f2bV_matches | 2020-06-07 17:53:20 | 
| 31.134.209.80 | attack | Unauthorized connection attempt detected from IP address 31.134.209.80 to port 6092 [T] | 2020-06-07 17:43:42 |