City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.200.2.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46250
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;92.200.2.61. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:17:47 CST 2025
;; MSG SIZE rcvd: 104
61.2.200.92.in-addr.arpa domain name pointer port-92-200-2-61.dynamic.as20676.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
61.2.200.92.in-addr.arpa name = port-92-200-2-61.dynamic.as20676.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.176.27.250 | attackbotsspam | 01/21/2020-00:00:25.775277 185.176.27.250 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-01-21 07:06:59 |
| 167.99.140.14 | attackspam | 400 BAD REQUEST |
2020-01-21 07:23:08 |
| 183.82.3.248 | attack | 2019-09-05T04:37:58.406840-07:00 suse-nuc sshd[13273]: Invalid user nagios from 183.82.3.248 port 49452 ... |
2020-01-21 07:41:52 |
| 213.32.52.1 | attackspambots | Unauthorized connection attempt detected from IP address 213.32.52.1 to port 2220 [J] |
2020-01-21 07:17:57 |
| 187.111.217.58 | attackspam | 2019-06-28T17:40:00.295758suse-nuc sshd[21999]: error: maximum authentication attempts exceeded for root from 187.111.217.58 port 35137 ssh2 [preauth] 2019-06-28T17:40:08.603885suse-nuc sshd[22006]: error: maximum authentication attempts exceeded for root from 187.111.217.58 port 35141 ssh2 [preauth] 2019-06-28T17:40:23.820599suse-nuc sshd[22010]: Invalid user admin from 187.111.217.58 port 35151 2019-06-28T17:40:23.820599suse-nuc sshd[22010]: Invalid user admin from 187.111.217.58 port 35151 2019-06-28T17:40:24.774506suse-nuc sshd[22010]: error: maximum authentication attempts exceeded for invalid user admin from 187.111.217.58 port 35151 ssh2 [preauth] 2019-06-28T17:40:32.957392suse-nuc sshd[22012]: Invalid user admin from 187.111.217.58 port 35154 ... |
2020-01-21 07:07:24 |
| 187.111.23.14 | attackspambots | 2019-11-17T12:43:21.240795suse-nuc sshd[6719]: Invalid user vumai from 187.111.23.14 port 36827 ... |
2020-01-21 07:06:26 |
| 186.59.10.197 | attackbotsspam | 2019-09-18T20:40:13.962614suse-nuc sshd[27201]: Invalid user admin from 186.59.10.197 port 40758 ... |
2020-01-21 07:18:18 |
| 222.186.30.35 | attack | 01/20/2020-18:07:24.050693 222.186.30.35 Protocol: 6 ET SCAN Potential SSH Scan |
2020-01-21 07:10:51 |
| 186.202.179.238 | attackbotsspam | 2020-01-08T16:13:51.389806suse-nuc sshd[20391]: Invalid user ops from 186.202.179.238 port 13497 ... |
2020-01-21 07:31:53 |
| 186.216.152.2 | attackspam | 2019-12-07T14:43:40.342081suse-nuc sshd[22331]: Invalid user thomborson from 186.216.152.2 port 44448 ... |
2020-01-21 07:26:26 |
| 186.71.57.18 | attackspambots | 2019-10-16T11:32:34.328144suse-nuc sshd[4401]: Invalid user ltdev from 186.71.57.18 port 35874 ... |
2020-01-21 07:13:45 |
| 202.29.176.73 | attack | Jan 20 22:10:14 ourumov-web sshd\[4987\]: Invalid user tlc from 202.29.176.73 port 49587 Jan 20 22:10:14 ourumov-web sshd\[4987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.176.73 Jan 20 22:10:17 ourumov-web sshd\[4987\]: Failed password for invalid user tlc from 202.29.176.73 port 49587 ssh2 ... |
2020-01-21 07:16:52 |
| 186.96.101.91 | attackspam | 2019-09-30T22:33:13.996449suse-nuc sshd[7623]: Invalid user student from 186.96.101.91 port 39296 ... |
2020-01-21 07:13:29 |
| 106.52.121.64 | attack | Jan 21 00:21:55 amit sshd\[14297\]: Invalid user felix from 106.52.121.64 Jan 21 00:21:55 amit sshd\[14297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.121.64 Jan 21 00:21:57 amit sshd\[14297\]: Failed password for invalid user felix from 106.52.121.64 port 36208 ssh2 ... |
2020-01-21 07:39:05 |
| 120.237.123.242 | attack | Jan 20 23:56:28 localhost sshd\[13486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.237.123.242 user=root Jan 20 23:56:31 localhost sshd\[13486\]: Failed password for root from 120.237.123.242 port 25846 ssh2 Jan 21 00:01:03 localhost sshd\[13668\]: Invalid user lee from 120.237.123.242 Jan 21 00:01:03 localhost sshd\[13668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.237.123.242 Jan 21 00:01:05 localhost sshd\[13668\]: Failed password for invalid user lee from 120.237.123.242 port 16501 ssh2 ... |
2020-01-21 07:27:51 |