City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.194.139.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.194.139.38. IN A
;; AUTHORITY SECTION:
. 277 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 04:58:52 CST 2022
;; MSG SIZE rcvd: 106
38.139.194.93.in-addr.arpa domain name pointer p5dc28b26.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
38.139.194.93.in-addr.arpa name = p5dc28b26.dip0.t-ipconnect.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
106.5.8.164 | attackspambots | 26/tcp 23/tcp [2020-03-30]2pkt |
2020-04-01 21:13:21 |
207.36.12.30 | attack | Apr 1 14:31:33 v22019038103785759 sshd\[16635\]: Invalid user cclj from 207.36.12.30 port 6712 Apr 1 14:31:33 v22019038103785759 sshd\[16635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.36.12.30 Apr 1 14:31:36 v22019038103785759 sshd\[16635\]: Failed password for invalid user cclj from 207.36.12.30 port 6712 ssh2 Apr 1 14:35:32 v22019038103785759 sshd\[16886\]: Invalid user hkcfpsmtp from 207.36.12.30 port 6943 Apr 1 14:35:32 v22019038103785759 sshd\[16886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.36.12.30 ... |
2020-04-01 20:50:54 |
101.0.35.31 | attackbotsspam | 445/tcp [2020-04-01]1pkt |
2020-04-01 21:22:55 |
187.188.159.231 | attackspambots | 445/tcp 445/tcp 445/tcp [2020-03-09/04-01]3pkt |
2020-04-01 20:51:19 |
185.176.222.39 | botsattack | On 31 Mar 2020, a computer with IP address 185.176.222.39 tried to establish an incoming connection on TCP port 7575. The request was denied via connection alert. |
2020-04-01 21:04:26 |
172.104.92.209 | attackbotsspam | 1900/tcp 1900/tcp 1900/tcp... [2020-01-31/04-01]74pkt,1pt.(tcp) |
2020-04-01 20:39:51 |
106.13.223.100 | attack | Apr 1 14:32:37 [host] sshd[25323]: pam_unix(sshd: Apr 1 14:32:38 [host] sshd[25323]: Failed passwor Apr 1 14:35:31 [host] sshd[25376]: pam_unix(sshd: |
2020-04-01 20:52:38 |
171.244.139.142 | attackspambots | Apr 1 02:47:22 web1 sshd\[8868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.139.142 user=root Apr 1 02:47:25 web1 sshd\[8868\]: Failed password for root from 171.244.139.142 port 48600 ssh2 Apr 1 02:51:25 web1 sshd\[9305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.139.142 user=root Apr 1 02:51:26 web1 sshd\[9305\]: Failed password for root from 171.244.139.142 port 43732 ssh2 Apr 1 02:55:29 web1 sshd\[9740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.139.142 user=root |
2020-04-01 20:58:11 |
14.204.211.122 | attackspam | 1433/tcp 1433/tcp 1433/tcp... [2020-02-06/03-31]4pkt,1pt.(tcp) |
2020-04-01 20:39:23 |
202.63.202.235 | attackspam | 23/tcp 26/tcp [2020-03-26/04-01]2pkt |
2020-04-01 21:17:43 |
81.182.41.79 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 01-04-2020 13:35:17. |
2020-04-01 21:09:20 |
104.248.45.204 | attackbotsspam | Apr 1 14:47:22 legacy sshd[22342]: Failed password for root from 104.248.45.204 port 33472 ssh2 Apr 1 14:51:21 legacy sshd[22436]: Failed password for root from 104.248.45.204 port 45006 ssh2 ... |
2020-04-01 21:00:11 |
115.73.165.156 | attackbotsspam | Automatic report - Port Scan Attack |
2020-04-01 20:54:50 |
156.249.63.45 | attack | 1432/tcp 1433/tcp 1434/tcp... [2020-03-30/31]60pkt,30pt.(tcp) |
2020-04-01 21:19:37 |
103.8.119.166 | attack | 2020-04-01T12:25:02.205868Z 9b0e70d72187 New connection: 103.8.119.166:48568 (172.17.0.3:2222) [session: 9b0e70d72187] 2020-04-01T12:35:42.813709Z 3c9e7f559505 New connection: 103.8.119.166:45488 (172.17.0.3:2222) [session: 3c9e7f559505] |
2020-04-01 20:40:25 |