City: Munich
Region: Bavaria
Country: Germany
Internet Service Provider: Vodafone
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.216.49.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.216.49.39. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022013100 1800 900 604800 86400
;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 31 13:16:22 CST 2022
;; MSG SIZE rcvd: 105
39.49.216.94.in-addr.arpa domain name pointer dslb-094-216-049-039.094.216.pools.vodafone-ip.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
39.49.216.94.in-addr.arpa name = dslb-094-216-049-039.094.216.pools.vodafone-ip.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
91.192.204.89 | attackspambots | 23/tcp [2019-06-26]1pkt |
2019-06-26 20:13:04 |
195.34.74.180 | attackspambots | 8080/tcp [2019-06-26]1pkt |
2019-06-26 20:06:37 |
222.107.26.125 | attackbotsspam | Jun 26 04:42:17 debian sshd\[18267\]: Invalid user cacheusr from 222.107.26.125 port 43872 Jun 26 04:42:17 debian sshd\[18267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.107.26.125 ... |
2019-06-26 20:23:02 |
181.171.33.212 | attackspam | 8000/tcp 8000/tcp 8000/tcp [2019-06-26]3pkt |
2019-06-26 20:24:04 |
218.92.0.193 | attackbotsspam | Jun 26 11:04:33 meumeu sshd[5421]: Failed password for root from 218.92.0.193 port 60406 ssh2 Jun 26 11:04:48 meumeu sshd[5421]: Failed password for root from 218.92.0.193 port 60406 ssh2 Jun 26 11:04:54 meumeu sshd[5421]: Failed password for root from 218.92.0.193 port 60406 ssh2 Jun 26 11:04:54 meumeu sshd[5421]: error: maximum authentication attempts exceeded for root from 218.92.0.193 port 60406 ssh2 [preauth] ... |
2019-06-26 20:16:52 |
62.210.116.61 | attackspambots | xmlrpc attack |
2019-06-26 20:01:21 |
110.137.21.24 | attack | 445/tcp [2019-06-26]1pkt |
2019-06-26 20:19:18 |
93.182.77.154 | attackspam | 23/tcp [2019-06-26]1pkt |
2019-06-26 20:14:16 |
1.58.143.129 | attack | SSHAttack |
2019-06-26 19:42:44 |
59.48.121.10 | attack | Unauthorized connection attempt from IP address 59.48.121.10 on Port 445(SMB) |
2019-06-26 20:05:20 |
1.82.26.42 | attack | 60001/tcp [2019-06-26]1pkt |
2019-06-26 20:18:10 |
117.23.50.3 | attack | Scanning and Vuln Attempts |
2019-06-26 20:20:27 |
50.236.62.110 | attackbots | Attempted login to invalid user |
2019-06-26 19:59:16 |
124.156.240.114 | attack | Scanning and Vuln Attempts |
2019-06-26 19:40:55 |
110.78.80.54 | attackspambots | Unauthorized connection attempt from IP address 110.78.80.54 on Port 445(SMB) |
2019-06-26 20:11:45 |