City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.252.95.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.252.95.254. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 17:39:29 CST 2025
;; MSG SIZE rcvd: 106
254.95.252.93.in-addr.arpa domain name pointer p5dfc5ffe.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
254.95.252.93.in-addr.arpa name = p5dfc5ffe.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 54.158.136.44 | attackbots | Triggered: repeated knocking on closed ports. |
2019-11-29 04:12:12 |
| 201.48.182.66 | attackspam | Unauthorized connection attempt from IP address 201.48.182.66 on Port 445(SMB) |
2019-11-29 04:05:34 |
| 190.211.243.82 | attackbots | Nov 28 20:57:51 mail postfix/smtpd[5375]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 20:57:51 mail postfix/smtpd[4175]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 20:57:51 mail postfix/smtpd[3931]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 20:57:51 mail postfix/smtpd[5039]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 28 20:57:51 mail postfix/smtpd[2944]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-29 04:21:14 |
| 218.92.0.137 | attackspam | Nov 28 15:30:18 TORMINT sshd\[377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.137 user=root Nov 28 15:30:20 TORMINT sshd\[377\]: Failed password for root from 218.92.0.137 port 50372 ssh2 Nov 28 15:30:23 TORMINT sshd\[377\]: Failed password for root from 218.92.0.137 port 50372 ssh2 ... |
2019-11-29 04:31:58 |
| 113.172.131.141 | attack | Lines containing failures of 113.172.131.141 Nov 28 15:09:48 omfg postfix/smtpd[2795]: warning: hostname static.vnpt.vn does not resolve to address 113.172.131.141 Nov 28 15:09:48 omfg postfix/smtpd[2795]: connect from unknown[113.172.131.141] Nov 28 15:09:50 omfg postfix/smtpd[2795]: Anonymous TLS connection established from unknown[113.172.131.141]: TLSv1.2 whostnameh cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bhostnames) Nov x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=113.172.131.141 |
2019-11-29 04:23:22 |
| 45.141.86.128 | attackspambots | Invalid user admin from 45.141.86.128 port 28549 |
2019-11-29 04:36:17 |
| 60.168.81.246 | attackspam | Nov 28 09:14:39 eola postfix/smtpd[2888]: connect from unknown[60.168.81.246] Nov 28 09:14:39 eola postfix/smtpd[2888]: NOQUEUE: reject: RCPT from unknown[60.168.81.246]: 504 5.5.2 |
2019-11-29 04:31:39 |
| 139.30.102.226 | attack | Nov 28 15:10:22 vbuntu sshd[4223]: refused connect from 139.30.102.226 (139.30.102.226) Nov 28 15:10:22 vbuntu sshd[4224]: refused connect from 139.30.102.226 (139.30.102.226) ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=139.30.102.226 |
2019-11-29 04:24:09 |
| 5.189.187.237 | attackspam | abuseConfidenceScore blocked for 12h |
2019-11-29 04:18:10 |
| 39.63.26.230 | attackbots | " " |
2019-11-29 04:18:26 |
| 77.81.230.143 | attackbotsspam | $f2bV_matches |
2019-11-29 04:27:22 |
| 103.86.132.133 | attackbots | port scan and connect, tcp 22 (ssh) |
2019-11-29 04:35:58 |
| 122.183.33.235 | attackspam | Invalid user ubnt from 122.183.33.235 port 62658 |
2019-11-29 04:33:56 |
| 196.152.1.222 | attackspam | Unauthorized connection attempt from IP address 196.152.1.222 on Port 445(SMB) |
2019-11-29 04:07:27 |
| 125.118.107.113 | attack | Nov 26 12:01:49 roadrisk sshd[2711]: Failed password for invalid user troha from 125.118.107.113 port 23446 ssh2 Nov 26 12:01:49 roadrisk sshd[2711]: Received disconnect from 125.118.107.113: 11: Bye Bye [preauth] Nov 26 12:06:57 roadrisk sshd[2808]: Failed password for invalid user webadmin from 125.118.107.113 port 6257 ssh2 Nov 26 12:06:57 roadrisk sshd[2808]: Received disconnect from 125.118.107.113: 11: Bye Bye [preauth] Nov 26 12:11:00 roadrisk sshd[2933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.118.107.113 user=games Nov 26 12:11:02 roadrisk sshd[2933]: Failed password for games from 125.118.107.113 port 40011 ssh2 Nov 26 12:11:02 roadrisk sshd[2933]: Received disconnect from 125.118.107.113: 11: Bye Bye [preauth] Nov 26 12:16:09 roadrisk sshd[3014]: Failed password for invalid user muellner from 125.118.107.113 port 9796 ssh2 Nov 26 12:16:09 roadrisk sshd[3014]: Received disconnect from 125.118.107.113: 11: By........ ------------------------------- |
2019-11-29 04:06:23 |