City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 134.119.207.105 | attackbots | Brute force attack stopped by firewall |
2020-10-06 07:22:13 |
| 134.119.207.105 | attack | Port Scan: TCP/80 |
2020-10-05 23:37:48 |
| 134.119.207.105 | attackspam | Port Scan: TCP/80 |
2020-10-05 15:37:02 |
| 134.119.206.3 | attack | Sep 14 21:01:58 web1 sshd[21837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3 user=root Sep 14 21:02:00 web1 sshd[21837]: Failed password for root from 134.119.206.3 port 39442 ssh2 Sep 14 21:06:40 web1 sshd[23974]: Invalid user send from 134.119.206.3 port 37836 Sep 14 21:06:40 web1 sshd[23974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3 Sep 14 21:06:40 web1 sshd[23974]: Invalid user send from 134.119.206.3 port 37836 Sep 14 21:06:42 web1 sshd[23974]: Failed password for invalid user send from 134.119.206.3 port 37836 ssh2 Sep 14 21:10:25 web1 sshd[25450]: Invalid user csgo from 134.119.206.3 port 53600 Sep 14 21:10:25 web1 sshd[25450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3 Sep 14 21:10:25 web1 sshd[25450]: Invalid user csgo from 134.119.206.3 port 53600 Sep 14 21:10:27 web1 sshd[25450]: Failed password fo ... |
2020-09-14 23:25:07 |
| 134.119.206.3 | attackspam | 2020-09-14T05:52:35.565145shield sshd\[6903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3 user=root 2020-09-14T05:52:36.726520shield sshd\[6903\]: Failed password for root from 134.119.206.3 port 57716 ssh2 2020-09-14T05:56:32.423871shield sshd\[8295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3 user=root 2020-09-14T05:56:34.789493shield sshd\[8295\]: Failed password for root from 134.119.206.3 port 43770 ssh2 2020-09-14T06:00:27.698070shield sshd\[9744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3 user=root |
2020-09-14 15:13:32 |
| 134.119.206.3 | attackbots | 2020-09-13T18:30:30.206949devel sshd[15582]: Failed password for root from 134.119.206.3 port 50766 ssh2 2020-09-13T18:34:04.141844devel sshd[15854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3 user=root 2020-09-13T18:34:06.046622devel sshd[15854]: Failed password for root from 134.119.206.3 port 36410 ssh2 |
2020-09-14 07:08:38 |
| 134.119.207.105 | attack | Unwanted checking 80 or 443 port ... |
2020-08-30 01:55:49 |
| 134.119.206.3 | attack | 2020-08-28T10:23:51.677492abusebot-4.cloudsearch.cf sshd[10111]: Invalid user test2 from 134.119.206.3 port 39676 2020-08-28T10:23:51.685309abusebot-4.cloudsearch.cf sshd[10111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3 2020-08-28T10:23:51.677492abusebot-4.cloudsearch.cf sshd[10111]: Invalid user test2 from 134.119.206.3 port 39676 2020-08-28T10:23:53.601237abusebot-4.cloudsearch.cf sshd[10111]: Failed password for invalid user test2 from 134.119.206.3 port 39676 ssh2 2020-08-28T10:29:56.097402abusebot-4.cloudsearch.cf sshd[10396]: Invalid user postgres from 134.119.206.3 port 42906 2020-08-28T10:29:56.102601abusebot-4.cloudsearch.cf sshd[10396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3 2020-08-28T10:29:56.097402abusebot-4.cloudsearch.cf sshd[10396]: Invalid user postgres from 134.119.206.3 port 42906 2020-08-28T10:29:57.792874abusebot-4.cloudsearch.cf sshd[10396]: ... |
2020-08-28 19:33:34 |
| 134.119.206.3 | attackbotsspam | B: Abusive ssh attack |
2020-08-21 01:14:14 |
| 134.119.228.106 | attackbotsspam | Sends Spam Mail |
2020-08-12 02:31:39 |
| 134.119.216.167 | attackbotsspam | Unauthorized access detected from black listed ip! |
2020-07-25 01:54:14 |
| 134.119.207.105 | attack | bot. ua spoofing, "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36" |
2020-07-10 23:32:51 |
| 134.119.219.71 | attackbots | 20 attempts against mh_ha-misbehave-ban on flame |
2020-06-28 21:46:13 |
| 134.119.216.241 | attackbots | [H1] Blocked by UFW |
2020-06-06 18:32:10 |
| 134.119.219.93 | attack | 20 attempts against mh-misbehave-ban on flame |
2020-06-05 16:54:30 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.119.2.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.119.2.130. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:36:46 CST 2022
;; MSG SIZE rcvd: 106
130.2.119.134.in-addr.arpa domain name pointer m17s4-2-23db.ispgateway.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
130.2.119.134.in-addr.arpa name = m17s4-2-23db.ispgateway.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.78.179.101 | attackspambots | firewall-block, port(s): 445/tcp |
2020-04-07 06:44:57 |
| 185.153.199.211 | attack | RDP Bruteforce |
2020-04-07 06:46:19 |
| 186.212.243.135 | attackbotsspam | Automatic report - Port Scan Attack |
2020-04-07 07:01:16 |
| 41.39.188.163 | attackbotsspam | Port probing on unauthorized port 1433 |
2020-04-07 06:39:40 |
| 47.151.246.31 | attackbots | 2020-04-06T21:39:16.350575abusebot-6.cloudsearch.cf sshd[14450]: Invalid user qhsupport from 47.151.246.31 port 59669 2020-04-06T21:39:16.357272abusebot-6.cloudsearch.cf sshd[14450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.151.246.31 2020-04-06T21:39:16.350575abusebot-6.cloudsearch.cf sshd[14450]: Invalid user qhsupport from 47.151.246.31 port 59669 2020-04-06T21:39:18.327900abusebot-6.cloudsearch.cf sshd[14450]: Failed password for invalid user qhsupport from 47.151.246.31 port 59669 ssh2 2020-04-06T21:41:16.981965abusebot-6.cloudsearch.cf sshd[14555]: Invalid user sybase from 47.151.246.31 port 41559 2020-04-06T21:41:16.988009abusebot-6.cloudsearch.cf sshd[14555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.151.246.31 2020-04-06T21:41:16.981965abusebot-6.cloudsearch.cf sshd[14555]: Invalid user sybase from 47.151.246.31 port 41559 2020-04-06T21:41:19.430503abusebot-6.cloudsearch.cf sshd[ ... |
2020-04-07 06:31:41 |
| 177.43.236.178 | attack | Apr 6 22:38:25 nextcloud sshd\[13302\]: Invalid user deploy from 177.43.236.178 Apr 6 22:38:25 nextcloud sshd\[13302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.236.178 Apr 6 22:38:27 nextcloud sshd\[13302\]: Failed password for invalid user deploy from 177.43.236.178 port 56856 ssh2 |
2020-04-07 07:05:29 |
| 37.114.145.67 | attackbots | Apr 6 17:23:56 mail.srvfarm.net postfix/smtpd[511934]: lost connection after CONNECT from unknown[37.114.145.67] Apr 6 17:26:45 mail.srvfarm.net postfix/smtps/smtpd[492679]: warning: unknown[37.114.145.67]: SASL PLAIN authentication failed: Apr 6 17:26:45 mail.srvfarm.net postfix/smtps/smtpd[492679]: lost connection after AUTH from unknown[37.114.145.67] Apr 6 17:27:57 mail.srvfarm.net postfix/smtpd[513889]: warning: unknown[37.114.145.67]: SASL PLAIN authentication failed: Apr 6 17:27:57 mail.srvfarm.net postfix/smtpd[513889]: lost connection after AUTH from unknown[37.114.145.67] |
2020-04-07 06:44:41 |
| 162.243.131.120 | attackbotsspam | firewall-block, port(s): 2376/tcp |
2020-04-07 06:50:52 |
| 94.64.231.168 | attackspam | firewall-block, port(s): 80/tcp |
2020-04-07 07:04:25 |
| 69.94.131.35 | attack | Apr 6 16:01:56 tempelhof postfix/smtpd[31788]: warning: hostname 69-94-131-35.nca.datanoc.com does not resolve to address 69.94.131.35: Name or service not known Apr 6 16:01:56 tempelhof postfix/smtpd[31788]: connect from unknown[69.94.131.35] Apr x@x Apr 6 16:01:57 tempelhof postfix/smtpd[31788]: disconnect from unknown[69.94.131.35] Apr 6 16:02:11 tempelhof postfix/smtpd[31788]: warning: hostname 69-94-131-35.nca.datanoc.com does not resolve to address 69.94.131.35: Name or service not known Apr 6 16:02:11 tempelhof postfix/smtpd[31788]: connect from unknown[69.94.131.35] Apr x@x Apr 6 16:02:12 tempelhof postfix/smtpd[31788]: disconnect from unknown[69.94.131.35] Apr 6 16:02:30 tempelhof postfix/smtpd[31797]: warning: hostname 69-94-131-35.nca.datanoc.com does not resolve to address 69.94.131.35: Name or service not known Apr 6 16:02:30 tempelhof postfix/smtpd[31797]: connect from unknown[69.94.131.35] Apr x@x Apr 6 16:02:31 tempelhof postfix/smtpd[31797]: di........ ------------------------------- |
2020-04-07 06:43:00 |
| 77.222.116.55 | attackspam | Unauthorized connection attempt from IP address 77.222.116.55 on Port 445(SMB) |
2020-04-07 06:31:02 |
| 62.171.172.225 | attack | Apr 7 00:48:07 nginx sshd[96662]: Invalid user cron from 62.171.172.225 Apr 7 00:48:07 nginx sshd[96662]: Received disconnect from 62.171.172.225 port 52174:11: Normal Shutdown [preauth] |
2020-04-07 07:04:40 |
| 27.34.251.60 | attack | Apr 6 22:44:08 minden010 sshd[8769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.34.251.60 Apr 6 22:44:10 minden010 sshd[8769]: Failed password for invalid user test from 27.34.251.60 port 54928 ssh2 Apr 6 22:48:20 minden010 sshd[10560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.34.251.60 ... |
2020-04-07 06:40:04 |
| 139.198.121.63 | attackbotsspam | Apr 7 00:51:44 vps647732 sshd[15334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.121.63 Apr 7 00:51:46 vps647732 sshd[15334]: Failed password for invalid user postgres from 139.198.121.63 port 55294 ssh2 ... |
2020-04-07 07:03:37 |
| 185.234.216.178 | attack | Apr 7 00:12:07 web01.agentur-b-2.de postfix/smtpd[305607]: warning: unknown[185.234.216.178]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 7 00:12:07 web01.agentur-b-2.de postfix/smtpd[305607]: lost connection after AUTH from unknown[185.234.216.178] Apr 7 00:13:22 web01.agentur-b-2.de postfix/smtpd[305607]: warning: unknown[185.234.216.178]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 7 00:13:22 web01.agentur-b-2.de postfix/smtpd[305607]: lost connection after AUTH from unknown[185.234.216.178] Apr 7 00:19:47 web01.agentur-b-2.de postfix/smtpd[445839]: warning: unknown[185.234.216.178]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-04-07 06:41:18 |