City: unknown
Region: unknown
Country: Germany
Internet Service Provider: Zap-Hosting GmbH & Co.KG
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attackspambots | Port 22 Scan, PTR: None |
2019-12-03 16:30:12 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 92.42.47.63 | attack | $f2bV_matches |
2019-12-14 18:57:45 |
| 92.42.47.81 | attackbotsspam | Port scan |
2019-11-13 04:40:15 |
| 92.42.47.65 | attackbotsspam | Many RDP login attempts detected by IDS script |
2019-07-24 12:39:03 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.42.47.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;92.42.47.8. IN A
;; AUTHORITY SECTION:
. 593 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019120300 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 03 16:30:08 CST 2019
;; MSG SIZE rcvd: 114
8.47.42.92.in-addr.arpa domain name pointer vps-zap459009-2.zap-srv.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
8.47.42.92.in-addr.arpa name = vps-zap459009-2.zap-srv.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 67.213.74.78 | attackspam | firewall-block, port(s): 2375/tcp |
2020-10-03 22:08:23 |
| 46.101.40.21 | attackspam | Oct 3 18:42:55 itv-usvr-02 sshd[30651]: Invalid user oracle from 46.101.40.21 port 55144 Oct 3 18:42:55 itv-usvr-02 sshd[30651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21 Oct 3 18:42:55 itv-usvr-02 sshd[30651]: Invalid user oracle from 46.101.40.21 port 55144 Oct 3 18:42:57 itv-usvr-02 sshd[30651]: Failed password for invalid user oracle from 46.101.40.21 port 55144 ssh2 Oct 3 18:50:23 itv-usvr-02 sshd[30978]: Invalid user user from 46.101.40.21 port 48124 |
2020-10-03 21:57:09 |
| 192.35.169.18 | attack | firewall-block, port(s): 990/tcp |
2020-10-03 22:36:52 |
| 192.35.169.20 | attackbotsspam |
|
2020-10-03 22:39:07 |
| 138.197.89.212 | attack | TCP port : 31463 |
2020-10-03 22:17:54 |
| 62.112.11.9 | attackspambots | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-10-03T09:33:31Z and 2020-10-03T10:24:30Z |
2020-10-03 22:24:09 |
| 64.227.19.127 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 5802 resulting in total of 3 scans from 64.227.0.0/17 block. |
2020-10-03 22:12:02 |
| 192.35.169.27 | attack | Automatic report - Banned IP Access |
2020-10-03 22:37:48 |
| 122.165.247.254 | attackspam |
|
2020-10-03 22:14:14 |
| 91.222.239.107 | attack | (mod_security) mod_security (id:210730) triggered by 91.222.239.107 (RU/Russia/-): 5 in the last 300 secs |
2020-10-03 22:26:33 |
| 195.14.170.50 | attackspam | TCP port : 10937 |
2020-10-03 22:23:27 |
| 128.199.134.165 | attackbotsspam | 21700/tcp 3914/tcp 19434/tcp... [2020-08-02/10-02]210pkt,71pt.(tcp) |
2020-10-03 21:58:27 |
| 192.35.169.26 | attack | port |
2020-10-03 22:27:42 |
| 95.85.34.53 | attack | k+ssh-bruteforce |
2020-10-03 22:39:27 |
| 60.220.187.113 | attackbotsspam | 30661/tcp 13978/tcp 6646/tcp... [2020-08-03/10-02]109pkt,65pt.(tcp) |
2020-10-03 22:20:40 |