City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.212.200.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.212.200.37.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:40:16 CST 2025
;; MSG SIZE  rcvd: 106
        37.200.212.93.in-addr.arpa domain name pointer p5dd4c825.dip0.t-ipconnect.de.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
37.200.212.93.in-addr.arpa	name = p5dd4c825.dip0.t-ipconnect.de.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 51.91.250.49 | attackbots | Invalid user dick from 51.91.250.49 port 58732  | 
                    2020-06-30 20:28:48 | 
| 187.189.15.14 | attackbots | 2020-06-30T05:30:57.372838ks3355764 sshd[9048]: Failed password for invalid user list from 187.189.15.14 port 36799 ssh2 2020-06-30T07:37:17.172984ks3355764 sshd[12520]: Invalid user rustserver from 187.189.15.14 port 32514 ...  | 
                    2020-06-30 20:04:43 | 
| 111.229.216.155 | attack | 2020-06-30T04:30:54.5003941495-001 sshd[32562]: Invalid user sftpuser from 111.229.216.155 port 39220 2020-06-30T04:30:54.5033961495-001 sshd[32562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.216.155 2020-06-30T04:30:54.5003941495-001 sshd[32562]: Invalid user sftpuser from 111.229.216.155 port 39220 2020-06-30T04:30:56.6934911495-001 sshd[32562]: Failed password for invalid user sftpuser from 111.229.216.155 port 39220 ssh2 2020-06-30T04:34:41.5338301495-001 sshd[32719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.216.155 user=root 2020-06-30T04:34:43.2174881495-001 sshd[32719]: Failed password for root from 111.229.216.155 port 37646 ssh2 ...  | 
                    2020-06-30 20:05:07 | 
| 119.29.152.172 | attackspambots | Invalid user honey from 119.29.152.172 port 52242  | 
                    2020-06-30 20:27:12 | 
| 94.102.51.75 | attackbots | 
  | 
                    2020-06-30 20:50:44 | 
| 124.156.112.181 | attackspam | $f2bV_matches  | 
                    2020-06-30 20:43:51 | 
| 139.59.69.76 | attackspam | Jun 30 14:16:52 minden010 sshd[15296]: Failed password for root from 139.59.69.76 port 34174 ssh2 Jun 30 14:21:03 minden010 sshd[16719]: Failed password for root from 139.59.69.76 port 60618 ssh2 ...  | 
                    2020-06-30 20:46:17 | 
| 195.54.160.228 | attackbots | [H1.VM2] Blocked by UFW  | 
                    2020-06-30 20:30:35 | 
| 81.68.97.184 | attackspam | 2020-06-30T12:16:26.175465abusebot-6.cloudsearch.cf sshd[4075]: Invalid user deploy from 81.68.97.184 port 44522 2020-06-30T12:16:26.181640abusebot-6.cloudsearch.cf sshd[4075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.97.184 2020-06-30T12:16:26.175465abusebot-6.cloudsearch.cf sshd[4075]: Invalid user deploy from 81.68.97.184 port 44522 2020-06-30T12:16:28.410568abusebot-6.cloudsearch.cf sshd[4075]: Failed password for invalid user deploy from 81.68.97.184 port 44522 ssh2 2020-06-30T12:25:13.106669abusebot-6.cloudsearch.cf sshd[4109]: Invalid user hduser from 81.68.97.184 port 47274 2020-06-30T12:25:13.112940abusebot-6.cloudsearch.cf sshd[4109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.97.184 2020-06-30T12:25:13.106669abusebot-6.cloudsearch.cf sshd[4109]: Invalid user hduser from 81.68.97.184 port 47274 2020-06-30T12:25:15.356775abusebot-6.cloudsearch.cf sshd[4109]: Failed password ...  | 
                    2020-06-30 20:35:45 | 
| 190.0.40.70 | attackspam | Lines containing failures of 190.0.40.70 Jun 29 22:47:56 nxxxxxxx sshd[14525]: Invalid user riccardo from 190.0.40.70 port 59590 Jun 29 22:47:56 nxxxxxxx sshd[14525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.40.70 Jun 29 22:47:58 nxxxxxxx sshd[14525]: Failed password for invalid user riccardo from 190.0.40.70 port 59590 ssh2 Jun 29 22:47:58 nxxxxxxx sshd[14525]: Received disconnect from 190.0.40.70 port 59590:11: Bye Bye [preauth] Jun 29 22:47:58 nxxxxxxx sshd[14525]: Disconnected from invalid user riccardo 190.0.40.70 port 59590 [preauth] Jun 29 22:55:30 nxxxxxxx sshd[15537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.40.70 user=r.r Jun 29 22:55:33 nxxxxxxx sshd[15537]: Failed password for r.r from 190.0.40.70 port 47288 ssh2 Jun 29 22:55:33 nxxxxxxx sshd[15537]: Received disconnect from 190.0.40.70 port 47288:11: Bye Bye [preauth] Jun 29 22:55:33 nxxxxxxx sshd[15537........ ------------------------------  | 
                    2020-06-30 20:32:26 | 
| 65.34.120.176 | attackbots | Jun 30 14:20:32 abendstille sshd\[26784\]: Invalid user dhj from 65.34.120.176 Jun 30 14:20:32 abendstille sshd\[26784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.34.120.176 Jun 30 14:20:34 abendstille sshd\[26784\]: Failed password for invalid user dhj from 65.34.120.176 port 46907 ssh2 Jun 30 14:25:08 abendstille sshd\[31268\]: Invalid user ubuntu from 65.34.120.176 Jun 30 14:25:08 abendstille sshd\[31268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.34.120.176 ...  | 
                    2020-06-30 20:42:30 | 
| 139.199.5.50 | attackspambots | Jun 30 11:15:43 vps sshd[517816]: Invalid user arma3server from 139.199.5.50 port 56870 Jun 30 11:15:43 vps sshd[517816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50 Jun 30 11:15:45 vps sshd[517816]: Failed password for invalid user arma3server from 139.199.5.50 port 56870 ssh2 Jun 30 11:18:04 vps sshd[528052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.5.50 user=root Jun 30 11:18:06 vps sshd[528052]: Failed password for root from 139.199.5.50 port 53800 ssh2 ...  | 
                    2020-06-30 20:20:36 | 
| 116.206.75.119 | attackbots | SSH bruteforce  | 
                    2020-06-30 20:08:29 | 
| 200.73.240.238 | attackbots | Jun 30 19:11:14 itv-usvr-02 sshd[8780]: Invalid user djones from 200.73.240.238 port 57834 Jun 30 19:11:14 itv-usvr-02 sshd[8780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.240.238 Jun 30 19:11:14 itv-usvr-02 sshd[8780]: Invalid user djones from 200.73.240.238 port 57834 Jun 30 19:11:16 itv-usvr-02 sshd[8780]: Failed password for invalid user djones from 200.73.240.238 port 57834 ssh2 Jun 30 19:15:41 itv-usvr-02 sshd[8940]: Invalid user bcx from 200.73.240.238 port 57072  | 
                    2020-06-30 20:26:06 | 
| 171.15.17.161 | attackbots | 2020-06-30T08:33:10.763725devel sshd[12324]: Invalid user steam from 171.15.17.161 port 46402 2020-06-30T08:33:12.826049devel sshd[12324]: Failed password for invalid user steam from 171.15.17.161 port 46402 ssh2 2020-06-30T08:36:34.176330devel sshd[12664]: Invalid user jenkins from 171.15.17.161 port 60366  | 
                    2020-06-30 20:47:42 |