City: Erxleben
Region: Sachsen-Anhalt
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.219.18.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.219.18.205. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022110901 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 10 04:09:17 CST 2022
;; MSG SIZE rcvd: 106
205.18.219.93.in-addr.arpa domain name pointer p5ddb12cd.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
205.18.219.93.in-addr.arpa name = p5ddb12cd.dip0.t-ipconnect.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
179.183.190.64 | attackbotsspam | Attempted connection to port 8080. |
2020-08-19 05:43:26 |
160.202.156.34 | attack | Unauthorized connection attempt from IP address 160.202.156.34 on Port 445(SMB) |
2020-08-19 05:53:17 |
66.190.254.165 | attackspambots | Port 22 Scan, PTR: None |
2020-08-19 05:44:34 |
103.146.23.110 | attack | Attempted connection to port 445. |
2020-08-19 05:52:05 |
189.195.134.142 | attackspambots | Unauthorized connection attempt from IP address 189.195.134.142 on Port 445(SMB) |
2020-08-19 05:46:07 |
200.73.128.183 | attackspam | Aug 19 02:08:14 gw1 sshd[30085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.128.183 Aug 19 02:08:15 gw1 sshd[30085]: Failed password for invalid user gast from 200.73.128.183 port 49548 ssh2 ... |
2020-08-19 05:21:29 |
106.13.21.24 | attackbots | Aug 18 23:10:48 PorscheCustomer sshd[5359]: Failed password for root from 106.13.21.24 port 57908 ssh2 Aug 18 23:12:25 PorscheCustomer sshd[5426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.21.24 Aug 18 23:12:28 PorscheCustomer sshd[5426]: Failed password for invalid user public from 106.13.21.24 port 51922 ssh2 ... |
2020-08-19 05:33:16 |
103.247.22.23 | attackspam | Attempted connection to port 445. |
2020-08-19 05:49:51 |
190.85.50.62 | attackbots | Unauthorized connection attempt from IP address 190.85.50.62 on Port 445(SMB) |
2020-08-19 05:51:37 |
78.220.160.61 | attack | Attempted connection to port 2004. |
2020-08-19 05:25:18 |
216.208.160.73 | attack | Port 22 Scan, PTR: None |
2020-08-19 05:23:32 |
172.88.41.130 | attackbots | Attempted connection to port 1433. |
2020-08-19 05:43:57 |
199.231.87.70 | attackbots | Attempted connection to port 28105. |
2020-08-19 05:36:17 |
51.210.151.242 | attackbotsspam | Aug 18 21:46:32 ajax sshd[19782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.151.242 Aug 18 21:46:34 ajax sshd[19782]: Failed password for invalid user monitor from 51.210.151.242 port 36414 ssh2 |
2020-08-19 05:19:50 |
118.27.6.66 | attackspambots | Aug 18 23:06:41 srv-ubuntu-dev3 sshd[38369]: Invalid user webadmin from 118.27.6.66 Aug 18 23:06:42 srv-ubuntu-dev3 sshd[38378]: Invalid user web from 118.27.6.66 Aug 18 23:06:41 srv-ubuntu-dev3 sshd[38369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.6.66 Aug 18 23:06:41 srv-ubuntu-dev3 sshd[38369]: Invalid user webadmin from 118.27.6.66 Aug 18 23:06:43 srv-ubuntu-dev3 sshd[38369]: Failed password for invalid user webadmin from 118.27.6.66 port 46718 ssh2 Aug 18 23:06:42 srv-ubuntu-dev3 sshd[38378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.6.66 Aug 18 23:06:42 srv-ubuntu-dev3 sshd[38378]: Invalid user web from 118.27.6.66 Aug 18 23:06:44 srv-ubuntu-dev3 sshd[38378]: Failed password for invalid user web from 118.27.6.66 port 43446 ssh2 Aug 18 23:06:46 srv-ubuntu-dev3 sshd[38381]: Invalid user webmaster from 118.27.6.66 ... |
2020-08-19 05:27:17 |