City: Düren
Region: Nordrhein-Westfalen
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.39.172.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.39.172.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 16:18:54 CST 2025
;; MSG SIZE rcvd: 105
20.172.39.91.in-addr.arpa domain name pointer p5b27ac14.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.172.39.91.in-addr.arpa name = p5b27ac14.dip0.t-ipconnect.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
108.167.131.163 | attackbots | $f2bV_matches |
2019-10-17 18:36:23 |
165.227.182.180 | attackspambots | Automatic report - XMLRPC Attack |
2019-10-17 18:20:35 |
61.172.142.58 | attack | Oct 17 05:47:48 host postfix/smtpd[31618]: warning: unknown[61.172.142.58]: SASL LOGIN authentication failed: authentication failure Oct 17 05:47:50 host postfix/smtpd[31618]: warning: unknown[61.172.142.58]: SASL LOGIN authentication failed: authentication failure ... |
2019-10-17 18:16:00 |
112.222.29.147 | attackbotsspam | [Aegis] @ 2019-10-17 06:15:39 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-10-17 18:30:48 |
212.92.234.14 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/212.92.234.14/ UA - 1H : (73) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : UA NAME ASN : ASN31272 IP : 212.92.234.14 CIDR : 212.92.224.0/19 PREFIX COUNT : 14 UNIQUE IP COUNT : 62464 WYKRYTE ATAKI Z ASN31272 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 3 DateTime : 2019-10-17 05:47:45 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-17 18:17:51 |
89.109.23.190 | attack | 2019-10-17T09:38:23.902349abusebot-5.cloudsearch.cf sshd\[2881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.23.190 user=root |
2019-10-17 18:04:18 |
223.197.243.5 | attackspambots | 2019-10-17T08:38:01.918477abusebot-5.cloudsearch.cf sshd\[2375\]: Invalid user bjorn from 223.197.243.5 port 49986 |
2019-10-17 18:04:51 |
61.172.238.14 | attackspambots | Oct 17 07:12:07 cp sshd[22513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.172.238.14 |
2019-10-17 18:14:19 |
51.38.112.45 | attack | Fail2Ban - SSH Bruteforce Attempt |
2019-10-17 18:05:56 |
96.44.187.10 | attack | Oct 17 06:44:06 imap-login: Info: Disconnected \(no auth attempts in 13 secs\): user=\<\>, rip=96.44.187.10, lip=192.168.100.101, session=\ |
2019-10-17 18:01:34 |
58.224.243.99 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-10-17 17:58:22 |
51.75.165.119 | attackspambots | Oct 16 18:51:52 friendsofhawaii sshd\[31610\]: Invalid user shelly from 51.75.165.119 Oct 16 18:51:52 friendsofhawaii sshd\[31610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip119.ip-51-75-165.eu Oct 16 18:51:54 friendsofhawaii sshd\[31610\]: Failed password for invalid user shelly from 51.75.165.119 port 55740 ssh2 Oct 16 18:55:44 friendsofhawaii sshd\[31932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip119.ip-51-75-165.eu user=root Oct 16 18:55:45 friendsofhawaii sshd\[31932\]: Failed password for root from 51.75.165.119 port 38224 ssh2 |
2019-10-17 18:22:33 |
164.132.47.139 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/164.132.47.139/ FR - 1H : (82) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : FR NAME ASN : ASN16276 IP : 164.132.47.139 CIDR : 164.132.0.0/16 PREFIX COUNT : 132 UNIQUE IP COUNT : 3052544 WYKRYTE ATAKI Z ASN16276 : 1H - 2 3H - 5 6H - 16 12H - 30 24H - 61 DateTime : 2019-10-17 12:34:00 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN - data recovery |
2019-10-17 18:34:53 |
159.203.201.250 | attack | ET DROP Dshield Block Listed Source group 1 - port: 40373 proto: TCP cat: Misc Attack |
2019-10-17 18:16:48 |
51.254.49.102 | attackspambots | " " |
2019-10-17 18:02:28 |