City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.214.200.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;92.214.200.145. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 00:20:17 CST 2025
;; MSG SIZE rcvd: 107
145.200.214.92.in-addr.arpa domain name pointer ipservice-092-214-200-145.092.214.pools.vodafone-ip.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.200.214.92.in-addr.arpa name = ipservice-092-214-200-145.092.214.pools.vodafone-ip.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 188.166.164.10 | attackspambots | SSH Brute Force |
2020-08-01 16:34:37 |
| 79.104.59.202 | attackspam | DATE:2020-08-01 05:50:59, IP:79.104.59.202, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq) |
2020-08-01 16:57:37 |
| 94.102.51.29 | attackbots |
|
2020-08-01 16:25:08 |
| 34.82.27.159 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-01T06:24:18Z and 2020-08-01T06:37:14Z |
2020-08-01 16:43:01 |
| 61.177.172.13 | attackbotsspam | Repeated brute force against a port |
2020-08-01 16:39:01 |
| 37.49.230.240 | attackbots |
|
2020-08-01 16:51:44 |
| 175.139.3.41 | attackspam | <6 unauthorized SSH connections |
2020-08-01 16:42:00 |
| 212.129.24.108 | attackbotsspam | CF RAY ID: 5b8b7b2d8879a885 IP Class: noRecord URI: /portal/wp-includes/wlwmanifest.xml |
2020-08-01 16:43:27 |
| 113.141.166.197 | attackbots | Invalid user ela from 113.141.166.197 port 55654 |
2020-08-01 16:27:06 |
| 195.24.207.114 | attackspam | Aug 1 10:57:36 ip106 sshd[1386]: Failed password for root from 195.24.207.114 port 34744 ssh2 ... |
2020-08-01 17:02:51 |
| 220.133.4.101 | attackbots | Unauthorized connection attempt detected from IP address 220.133.4.101 to port 88 |
2020-08-01 17:00:55 |
| 91.134.143.172 | attackbotsspam | Aug 1 09:34:25 *hidden* sshd[3437]: Failed password for *hidden* from 91.134.143.172 port 50652 ssh2 Aug 1 09:38:46 *hidden* sshd[3994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.143.172 user=root Aug 1 09:38:48 *hidden* sshd[3994]: Failed password for *hidden* from 91.134.143.172 port 34174 ssh2 |
2020-08-01 16:24:05 |
| 128.201.78.220 | attackspambots | $f2bV_matches |
2020-08-01 16:58:12 |
| 41.63.7.169 | attackspam | Attempted connection to port 445. |
2020-08-01 16:49:12 |
| 5.202.158.27 | attack | Attempted connection to port 23. |
2020-08-01 16:41:36 |