City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.245.85.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.245.85.57. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 05:16:46 CST 2025
;; MSG SIZE rcvd: 105
57.85.245.93.in-addr.arpa domain name pointer p5df55539.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
57.85.245.93.in-addr.arpa name = p5df55539.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 66.85.6.195 | attack | Unauthorized connection attempt detected from IP address 66.85.6.195 to port 83 [J] |
2020-01-20 20:04:14 |
| 109.251.68.112 | attackbotsspam | Jan 20 12:02:48 ns382633 sshd\[28156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112 user=root Jan 20 12:02:50 ns382633 sshd\[28156\]: Failed password for root from 109.251.68.112 port 45144 ssh2 Jan 20 12:22:30 ns382633 sshd\[31827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112 user=root Jan 20 12:22:32 ns382633 sshd\[31827\]: Failed password for root from 109.251.68.112 port 33992 ssh2 Jan 20 12:26:24 ns382633 sshd\[32630\]: Invalid user Admin from 109.251.68.112 port 36396 Jan 20 12:26:24 ns382633 sshd\[32630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112 |
2020-01-20 20:19:57 |
| 128.92.217.171 | attackspam | Unauthorized connection attempt detected from IP address 128.92.217.171 to port 4567 [J] |
2020-01-20 20:16:02 |
| 69.6.31.150 | attack | Unauthorized connection attempt detected from IP address 69.6.31.150 to port 80 [J] |
2020-01-20 20:03:47 |
| 167.99.234.170 | attackspam | Unauthorized connection attempt detected from IP address 167.99.234.170 to port 2220 [J] |
2020-01-20 20:14:21 |
| 157.245.34.150 | attackbots | Unauthorized connection attempt detected from IP address 157.245.34.150 to port 443 [J] |
2020-01-20 20:14:46 |
| 76.119.111.250 | attackbots | Unauthorized connection attempt detected from IP address 76.119.111.250 to port 23 [J] |
2020-01-20 20:02:49 |
| 58.6.81.142 | attackbots | Unauthorized connection attempt detected from IP address 58.6.81.142 to port 81 [J] |
2020-01-20 20:06:38 |
| 103.52.216.170 | attack | Unauthorized connection attempt detected from IP address 103.52.216.170 to port 9000 [J] |
2020-01-20 20:00:20 |
| 77.42.88.70 | attackspam | Unauthorized connection attempt detected from IP address 77.42.88.70 to port 23 [J] |
2020-01-20 20:23:03 |
| 169.0.182.55 | attackspam | Unauthorized connection attempt detected from IP address 169.0.182.55 to port 88 [J] |
2020-01-20 20:13:53 |
| 95.47.50.39 | attackbotsspam | Unauthorized connection attempt detected from IP address 95.47.50.39 to port 80 [J] |
2020-01-20 20:21:08 |
| 5.165.83.64 | attack | Unauthorized connection attempt detected from IP address 5.165.83.64 to port 23 [J] |
2020-01-20 20:27:06 |
| 113.22.107.231 | attackspambots | Unauthorized connection attempt detected from IP address 113.22.107.231 to port 23 [J] |
2020-01-20 20:18:49 |
| 104.3.10.11 | attack | Unauthorized connection attempt detected from IP address 104.3.10.11 to port 81 [J] |
2020-01-20 20:38:22 |