City: Ljubljana
Region: Ljubljana
Country: Slovenia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.142.91.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.142.91.244. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121901 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 04:36:18 CST 2025
;; MSG SIZE rcvd: 106
244.91.142.89.in-addr.arpa domain name pointer BSN-142-91-244.dynamic.siol.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
244.91.142.89.in-addr.arpa name = BSN-142-91-244.dynamic.siol.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 217.61.122.160 | attackspam | SSHAttack |
2019-10-30 21:46:54 |
| 82.209.86.184 | attack | Chat Spam |
2019-10-30 21:19:18 |
| 2600:3c00::f03c:92ff:fedb:4563 | attackbots | 8000/tcp 55553/tcp 10134/tcp... [2019-10-11/29]17pkt,16pt.(tcp) |
2019-10-30 21:27:30 |
| 177.135.184.69 | attackbots | Oct 30 12:53:54 ns381471 sshd[10570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.184.69 Oct 30 12:53:56 ns381471 sshd[10570]: Failed password for invalid user sniffer from 177.135.184.69 port 57402 ssh2 |
2019-10-30 21:32:54 |
| 62.162.103.206 | attack | Automatic report - Banned IP Access |
2019-10-30 21:40:45 |
| 61.10.2.39 | attack | 1433/tcp 445/tcp... [2019-10-15/30]7pkt,2pt.(tcp) |
2019-10-30 21:31:03 |
| 45.82.153.76 | attack | 2019-10-30T14:29:22.201715mail01 postfix/smtpd[23518]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-10-30T14:29:44.139175mail01 postfix/smtpd[20447]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-10-30T14:30:18.118767mail01 postfix/smtpd[24424]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-10-30 21:35:03 |
| 112.35.44.125 | attackbots | Oct 30 14:17:29 lnxded64 sshd[18210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.44.125 |
2019-10-30 21:58:18 |
| 118.96.87.19 | attackbotsspam | 445/tcp [2019-10-30]1pkt |
2019-10-30 21:53:21 |
| 171.234.152.244 | attackbotsspam | 445/tcp 445/tcp [2019-10-28]2pkt |
2019-10-30 21:38:53 |
| 46.175.243.9 | attackspambots | Oct 30 14:29:22 vps691689 sshd[12549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.175.243.9 Oct 30 14:29:24 vps691689 sshd[12549]: Failed password for invalid user password from 46.175.243.9 port 34676 ssh2 ... |
2019-10-30 21:43:06 |
| 179.187.159.56 | attack | Oct 30 11:53:55 *** sshd[7582]: User root from 179.187.159.56 not allowed because not listed in AllowUsers |
2019-10-30 21:32:28 |
| 27.12.39.116 | attack | 60001/tcp [2019-10-30]1pkt |
2019-10-30 21:54:30 |
| 187.104.5.92 | attackbots | 2019-10-30T11:54:03.592971Z a3e7bf3c9042 New connection: 187.104.5.92:52638 (172.17.0.3:2222) [session: a3e7bf3c9042] 2019-10-30T11:54:03.632514Z dcfcc8f3dd86 New connection: 187.104.5.92:53326 (172.17.0.3:2222) [session: dcfcc8f3dd86] |
2019-10-30 21:24:59 |
| 1.172.11.78 | attackspam | Portscan or hack attempt detected by psad/fwsnort |
2019-10-30 21:40:58 |