City: Krems
Region: Lower Austria
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: JM-DATA GmbH
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.13.7.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38610
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.13.7.141. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019070200 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 03 00:48:23 CST 2019
;; MSG SIZE rcvd: 115
141.7.13.85.in-addr.arpa domain name pointer 85.13.7.141.jm-data.at.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
141.7.13.85.in-addr.arpa name = 85.13.7.141.jm-data.at.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
180.109.94.219 | attackspambots | 1433/tcp [2020-04-05]1pkt |
2020-04-06 05:39:14 |
202.166.174.27 | attack | firewall-block, port(s): 1433/tcp |
2020-04-06 05:40:19 |
103.145.12.43 | attackbotsspam | firewall-block, port(s): 5060/udp |
2020-04-06 05:51:08 |
123.140.114.196 | attackspam | 2020-04-05T21:31:18.296732abusebot-7.cloudsearch.cf sshd[17681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196 user=root 2020-04-05T21:31:20.428183abusebot-7.cloudsearch.cf sshd[17681]: Failed password for root from 123.140.114.196 port 42742 ssh2 2020-04-05T21:34:11.439761abusebot-7.cloudsearch.cf sshd[18132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196 user=root 2020-04-05T21:34:13.321104abusebot-7.cloudsearch.cf sshd[18132]: Failed password for root from 123.140.114.196 port 60752 ssh2 2020-04-05T21:37:07.792546abusebot-7.cloudsearch.cf sshd[18369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196 user=root 2020-04-05T21:37:10.170453abusebot-7.cloudsearch.cf sshd[18369]: Failed password for root from 123.140.114.196 port 50532 ssh2 2020-04-05T21:40:01.025772abusebot-7.cloudsearch.cf sshd[18683]: pam_unix(sshd: ... |
2020-04-06 05:55:54 |
186.139.240.110 | attack | 9530/tcp [2020-04-05]1pkt |
2020-04-06 05:30:38 |
143.202.112.114 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-04-06 05:30:57 |
159.203.27.146 | attack | SSH Brute-Force reported by Fail2Ban |
2020-04-06 05:43:08 |
111.202.167.7 | attack | too many failed pop/imap login attempts |
2020-04-06 05:43:38 |
194.26.29.122 | attack | firewall-block, port(s): 19489/tcp |
2020-04-06 05:42:50 |
217.182.67.242 | attackspambots | Apr 5 16:55:30 lanister sshd[11899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.67.242 user=root Apr 5 16:55:32 lanister sshd[11899]: Failed password for root from 217.182.67.242 port 44981 ssh2 Apr 5 16:59:31 lanister sshd[11975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.67.242 user=root Apr 5 16:59:33 lanister sshd[11975]: Failed password for root from 217.182.67.242 port 50729 ssh2 |
2020-04-06 05:27:05 |
110.52.215.80 | attackbots | 6379/tcp [2020-04-05]1pkt |
2020-04-06 05:36:25 |
212.33.250.241 | attackbotsspam | Apr 5 21:40:08 *** sshd[19450]: User root from 212.33.250.241 not allowed because not listed in AllowUsers |
2020-04-06 05:42:27 |
188.166.251.156 | attackbotsspam | leo_www |
2020-04-06 05:40:34 |
188.165.227.140 | attackbots | Apr 5 22:44:48 v22018086721571380 sshd[27431]: Failed password for invalid user openvpn from 188.165.227.140 port 45137 ssh2 |
2020-04-06 05:34:35 |
197.34.113.204 | attackspambots | firewall-block, port(s): 23/tcp |
2020-04-06 05:42:09 |