City: Lüneburg
Region: Niedersachsen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.102.48.110
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.102.48.110. IN A
;; AUTHORITY SECTION:
. 528 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022101701 1800 900 604800 86400
;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 18 13:17:55 CST 2022
;; MSG SIZE rcvd: 107
110.48.102.134.in-addr.arpa domain name pointer client-pool2-110.vpn.uni-bremen.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
110.48.102.134.in-addr.arpa name = client-pool2-110.vpn.uni-bremen.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
120.71.145.166 | attackspam | Feb 27 12:34:50 gw1 sshd[6847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.166 Feb 27 12:34:52 gw1 sshd[6847]: Failed password for invalid user debian from 120.71.145.166 port 51433 ssh2 ... |
2020-02-27 15:35:25 |
140.136.210.141 | attack | Honeypot attack, port: 81, PTR: slib2-141.lib.fju.edu.tw. |
2020-02-27 15:47:00 |
51.83.69.132 | attack | 51.83.69.132 - - [27/Feb/2020:10:52:53 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-02-27 15:38:37 |
193.248.60.205 | attackspambots | Invalid user tiancheng from 193.248.60.205 port 41552 |
2020-02-27 15:34:38 |
175.98.100.18 | attackspam | Honeypot attack, port: 445, PTR: 175-98-100-18.static.tfn.net.tw. |
2020-02-27 16:09:00 |
1.203.115.141 | attackbots | Feb 26 21:29:39 tdfoods sshd\[6443\]: Invalid user lisha from 1.203.115.141 Feb 26 21:29:39 tdfoods sshd\[6443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.141 Feb 26 21:29:41 tdfoods sshd\[6443\]: Failed password for invalid user lisha from 1.203.115.141 port 40561 ssh2 Feb 26 21:37:29 tdfoods sshd\[7074\]: Invalid user gpadmin from 1.203.115.141 Feb 26 21:37:29 tdfoods sshd\[7074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.141 |
2020-02-27 15:47:31 |
222.82.228.98 | attackbotsspam | Feb 27 06:00:37 mail sshd[4868]: Invalid user freeg from 222.82.228.98 Feb 27 06:00:37 mail sshd[4868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.228.98 Feb 27 06:00:37 mail sshd[4868]: Invalid user freeg from 222.82.228.98 Feb 27 06:00:39 mail sshd[4868]: Failed password for invalid user freeg from 222.82.228.98 port 38408 ssh2 Feb 27 07:25:31 mail sshd[15781]: Invalid user anonymous from 222.82.228.98 ... |
2020-02-27 15:41:03 |
180.76.148.87 | attack | $f2bV_matches |
2020-02-27 15:55:10 |
35.189.172.158 | attackspambots | 2020-02-27T07:04:17.919116shield sshd\[15372\]: Invalid user backup from 35.189.172.158 port 37888 2020-02-27T07:04:17.924173shield sshd\[15372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.172.189.35.bc.googleusercontent.com 2020-02-27T07:04:20.319311shield sshd\[15372\]: Failed password for invalid user backup from 35.189.172.158 port 37888 ssh2 2020-02-27T07:09:30.728473shield sshd\[16545\]: Invalid user steve from 35.189.172.158 port 37782 2020-02-27T07:09:30.731524shield sshd\[16545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.172.189.35.bc.googleusercontent.com |
2020-02-27 15:22:47 |
43.226.146.192 | attackspambots | Feb 27 04:42:48 firewall sshd[8069]: Invalid user vncuser from 43.226.146.192 Feb 27 04:42:51 firewall sshd[8069]: Failed password for invalid user vncuser from 43.226.146.192 port 54056 ssh2 Feb 27 04:50:26 firewall sshd[8255]: Invalid user adrian from 43.226.146.192 ... |
2020-02-27 15:51:57 |
61.69.17.174 | attackspambots | Feb 26 04:10:22 cumulus sshd[11465]: Invalid user bruno from 61.69.17.174 port 46322 Feb 26 04:10:22 cumulus sshd[11465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.17.174 Feb 26 04:10:24 cumulus sshd[11465]: Failed password for invalid user bruno from 61.69.17.174 port 46322 ssh2 Feb 26 04:10:25 cumulus sshd[11465]: Received disconnect from 61.69.17.174 port 46322:11: Bye Bye [preauth] Feb 26 04:10:25 cumulus sshd[11465]: Disconnected from 61.69.17.174 port 46322 [preauth] Feb 26 04:17:34 cumulus sshd[11696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.17.174 user=nobody Feb 26 04:17:37 cumulus sshd[11696]: Failed password for nobody from 61.69.17.174 port 55576 ssh2 Feb 26 04:17:37 cumulus sshd[11696]: Received disconnect from 61.69.17.174 port 55576:11: Bye Bye [preauth] Feb 26 04:17:37 cumulus sshd[11696]: Disconnected from 61.69.17.174 port 55576 [preauth] ........ ------------------------------------- |
2020-02-27 15:37:10 |
218.92.0.201 | attack | Feb 27 08:16:26 legacy sshd[2754]: Failed password for root from 218.92.0.201 port 60442 ssh2 Feb 27 08:16:29 legacy sshd[2754]: Failed password for root from 218.92.0.201 port 60442 ssh2 Feb 27 08:16:31 legacy sshd[2754]: Failed password for root from 218.92.0.201 port 60442 ssh2 ... |
2020-02-27 15:34:08 |
106.13.236.114 | attack | 2020-02-27T18:56:00.650580luisaranguren sshd[1809779]: Connection from 106.13.236.114 port 37674 on 10.10.10.6 port 22 rdomain "" 2020-02-27T18:56:22.777056luisaranguren sshd[1809779]: Connection closed by 106.13.236.114 port 37674 [preauth] ... |
2020-02-27 16:01:03 |
111.91.149.72 | attack | unauthorized connection attempt |
2020-02-27 15:50:19 |
222.186.52.139 | attackbots | 2020-02-27T09:00:04.142671scmdmz1 sshd[11344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.139 user=root 2020-02-27T09:00:06.004839scmdmz1 sshd[11344]: Failed password for root from 222.186.52.139 port 29075 ssh2 2020-02-27T09:00:08.344779scmdmz1 sshd[11344]: Failed password for root from 222.186.52.139 port 29075 ssh2 2020-02-27T09:00:04.142671scmdmz1 sshd[11344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.139 user=root 2020-02-27T09:00:06.004839scmdmz1 sshd[11344]: Failed password for root from 222.186.52.139 port 29075 ssh2 2020-02-27T09:00:08.344779scmdmz1 sshd[11344]: Failed password for root from 222.186.52.139 port 29075 ssh2 2020-02-27T09:00:04.142671scmdmz1 sshd[11344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.139 user=root 2020-02-27T09:00:06.004839scmdmz1 sshd[11344]: Failed password for root from 222.186.52.139 port 29075 ssh2 2 |
2020-02-27 16:08:13 |