City: Frankfurt am Main
Region: Hesse
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: Deutsche Telekom AG
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.239.19.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31197
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;93.239.19.197. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019043000 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 30 20:11:03 +08 2019
;; MSG SIZE rcvd: 117
197.19.239.93.in-addr.arpa domain name pointer p5DEF13C5.dip0.t-ipconnect.de.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
197.19.239.93.in-addr.arpa name = p5DEF13C5.dip0.t-ipconnect.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.84.196.90 | attackbots | SmallBizIT.US 1 packets to tcp(22) |
2020-07-09 18:59:44 |
172.69.34.243 | attackspam | Bad crawling causing excessive 404 errors |
2020-07-09 19:25:52 |
185.143.72.27 | attackbotsspam | Jul 9 12:30:20 mail.srvfarm.net postfix/smtpd[3791537]: warning: unknown[185.143.72.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 9 12:30:48 mail.srvfarm.net postfix/smtpd[3795638]: warning: unknown[185.143.72.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 9 12:31:12 mail.srvfarm.net postfix/smtpd[3791536]: warning: unknown[185.143.72.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 9 12:31:41 mail.srvfarm.net postfix/smtpd[3795638]: warning: unknown[185.143.72.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 9 12:32:06 mail.srvfarm.net postfix/smtpd[3791535]: warning: unknown[185.143.72.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-07-09 19:07:45 |
194.26.29.32 | attack | [MK-VM6] Blocked by UFW |
2020-07-09 19:18:54 |
187.115.67.118 | attackbots | Wordpress malicious attack:[sshd] |
2020-07-09 19:26:07 |
185.220.101.31 | attack | Automatic report - Banned IP Access |
2020-07-09 19:34:49 |
112.166.133.216 | attackspam | Jul 9 10:38:53 l03 sshd[17475]: Invalid user webuser from 112.166.133.216 port 58794 ... |
2020-07-09 18:56:37 |
218.93.27.230 | attack | TCP port : 9922 |
2020-07-09 19:34:21 |
122.155.187.152 | attack | 445/tcp 1433/tcp [2020-07-06/09]2pkt |
2020-07-09 19:26:26 |
104.248.61.192 | attackbots | Failed password for invalid user katie from 104.248.61.192 port 37260 ssh2 |
2020-07-09 18:58:43 |
113.161.160.93 | attack | Helo |
2020-07-09 19:04:23 |
45.132.173.24 | attackspam | (smtpauth) Failed SMTP AUTH login from 45.132.173.24 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-09 08:20:24 plain authenticator failed for ([45.132.173.24]) [45.132.173.24]: 535 Incorrect authentication data (set_id=info) |
2020-07-09 19:32:34 |
46.98.128.160 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-07-09 19:10:07 |
122.116.63.32 | attackspam | port scan and connect, tcp 80 (http) |
2020-07-09 19:00:47 |
190.120.191.13 | attack | Honeypot attack, port: 445, PTR: cliente-191-14.fiber.net.ar. |
2020-07-09 19:30:03 |