City: Frankfurt am Main
Region: Hessen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 134.122.74.44 | attack | Unauthorized connection attempt detected from IP address 134.122.74.44 to port 143 [T] |
2020-08-29 20:14:04 |
| 134.122.74.58 | attackbots | 134.122.74.58 - - [15/Aug/2020:22:45:42 +0200] "GET /wp-login.php HTTP/1.1" 200 8775 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.122.74.58 - - [15/Aug/2020:22:45:44 +0200] "POST /wp-login.php HTTP/1.1" 200 9026 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.122.74.58 - - [15/Aug/2020:22:45:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-16 05:58:16 |
| 134.122.74.58 | attackbots | Attempt to hack Wordpress Login, XMLRPC or other login |
2020-08-05 18:22:07 |
| 134.122.74.58 | attackspambots | 134.122.74.58 - - [30/Jul/2020:06:10:20 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.122.74.58 - - [30/Jul/2020:06:10:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1890 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.122.74.58 - - [30/Jul/2020:06:10:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1887 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-30 17:07:36 |
| 134.122.74.237 | attackspambots | Apr 11 16:53:48 123flo sshd[5760]: Invalid user fake from 134.122.74.237 Apr 11 16:53:48 123flo sshd[5760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.74.237 Apr 11 16:53:48 123flo sshd[5760]: Invalid user fake from 134.122.74.237 Apr 11 16:53:50 123flo sshd[5760]: Failed password for invalid user fake from 134.122.74.237 port 43488 ssh2 Apr 11 16:53:52 123flo sshd[5764]: Invalid user admin from 134.122.74.237 |
2020-04-12 07:36:25 |
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 134.122.0.0 - 134.122.127.255
CIDR: 134.122.0.0/17
NetName: DIGITALOCEAN-134-122-0-0
NetHandle: NET-134-122-0-0-1
Parent: NET134 (NET-134-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: DigitalOcean, LLC (DO-13)
RegDate: 2019-09-06
Updated: 2020-04-03
Comment: Routing and Peering Policy can be found at https://www.as14061.net
Comment:
Comment: Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref: https://rdap.arin.net/registry/ip/134.122.0.0
OrgName: DigitalOcean, LLC
OrgId: DO-13
Address: 105 Edgeview Drive, Suite 425
City: Broomfield
StateProv: CO
PostalCode: 80021
Country: US
RegDate: 2012-05-14
Updated: 2025-04-11
Ref: https://rdap.arin.net/registry/entity/DO-13
OrgNOCHandle: NOC32014-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-646-827-4366
OrgNOCEmail: noc@digitalocean.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName: DigitalOcean Abuse
OrgAbusePhone: +1-646-827-4366
OrgAbuseEmail: abuse@digitalocean.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/DIGIT19-ARIN
OrgTechHandle: NOC32014-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-646-827-4366
OrgTechEmail: noc@digitalocean.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.122.74.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26963
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.122.74.232. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 06:30:49 CST 2026
;; MSG SIZE rcvd: 107
Host 232.74.122.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 232.74.122.134.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.52.234.191 | attackspambots | $f2bV_matches |
2020-01-05 13:30:35 |
| 78.221.89.145 | attackspam | Jul 10 06:50:01 vpn sshd[19708]: Invalid user pi from 78.221.89.145 Jul 10 06:50:01 vpn sshd[19708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.221.89.145 Jul 10 06:50:01 vpn sshd[19710]: Invalid user pi from 78.221.89.145 Jul 10 06:50:02 vpn sshd[19710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.221.89.145 Jul 10 06:50:03 vpn sshd[19708]: Failed password for invalid user pi from 78.221.89.145 port 49158 ssh2 |
2020-01-05 13:43:24 |
| 78.196.118.157 | attackbotsspam | Apr 3 23:44:19 vpn sshd[31504]: Invalid user pi from 78.196.118.157 Apr 3 23:44:19 vpn sshd[31506]: Invalid user pi from 78.196.118.157 Apr 3 23:44:19 vpn sshd[31504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.196.118.157 Apr 3 23:44:19 vpn sshd[31506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.196.118.157 Apr 3 23:44:21 vpn sshd[31504]: Failed password for invalid user pi from 78.196.118.157 port 49948 ssh2 |
2020-01-05 13:54:46 |
| 78.196.66.57 | attack | Mar 7 05:46:25 vpn sshd[24747]: Invalid user service from 78.196.66.57 Mar 7 05:46:25 vpn sshd[24747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.196.66.57 Mar 7 05:46:28 vpn sshd[24747]: Failed password for invalid user service from 78.196.66.57 port 41845 ssh2 Mar 7 05:46:30 vpn sshd[24747]: Failed password for invalid user service from 78.196.66.57 port 41845 ssh2 Mar 7 05:46:32 vpn sshd[24747]: Failed password for invalid user service from 78.196.66.57 port 41845 ssh2 |
2020-01-05 13:53:25 |
| 78.140.223.140 | attackspam | Dec 24 11:14:26 vpn sshd[24517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.140.223.140 Dec 24 11:14:28 vpn sshd[24517]: Failed password for invalid user sbserver from 78.140.223.140 port 43776 ssh2 Dec 24 11:19:37 vpn sshd[24539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.140.223.140 |
2020-01-05 14:01:09 |
| 78.188.64.28 | attackspam | Dec 18 06:00:07 vpn sshd[24413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.188.64.28 Dec 18 06:00:09 vpn sshd[24413]: Failed password for invalid user admin from 78.188.64.28 port 54033 ssh2 Dec 18 06:00:11 vpn sshd[24413]: Failed password for invalid user admin from 78.188.64.28 port 54033 ssh2 Dec 18 06:00:14 vpn sshd[24413]: Failed password for invalid user admin from 78.188.64.28 port 54033 ssh2 |
2020-01-05 13:56:53 |
| 159.65.234.23 | attackbotsspam | Automatic report - Banned IP Access |
2020-01-05 14:02:54 |
| 78.182.101.74 | attack | Jan 20 11:53:32 vpn sshd[9688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.182.101.74 Jan 20 11:53:34 vpn sshd[9688]: Failed password for invalid user teamspeak from 78.182.101.74 port 56937 ssh2 Jan 20 12:02:52 vpn sshd[9755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.182.101.74 |
2020-01-05 13:57:23 |
| 78.207.199.2 | attackspambots | Jul 23 11:31:30 vpn sshd[14641]: Invalid user pi from 78.207.199.2 Jul 23 11:31:30 vpn sshd[14641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.207.199.2 Jul 23 11:31:30 vpn sshd[14643]: Invalid user pi from 78.207.199.2 Jul 23 11:31:30 vpn sshd[14643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.207.199.2 Jul 23 11:31:32 vpn sshd[14641]: Failed password for invalid user pi from 78.207.199.2 port 53852 ssh2 |
2020-01-05 13:48:27 |
| 78.22.129.133 | attackspambots | Jun 2 05:34:32 vpn sshd[2811]: Invalid user pi from 78.22.129.133 Jun 2 05:34:32 vpn sshd[2810]: Invalid user pi from 78.22.129.133 Jun 2 05:34:32 vpn sshd[2811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.22.129.133 Jun 2 05:34:32 vpn sshd[2810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.22.129.133 Jun 2 05:34:34 vpn sshd[2811]: Failed password for invalid user pi from 78.22.129.133 port 53466 ssh2 |
2020-01-05 13:44:40 |
| 222.186.175.169 | attackbots | Jan 5 06:25:52 sso sshd[3967]: Failed password for root from 222.186.175.169 port 50514 ssh2 Jan 5 06:26:02 sso sshd[3967]: Failed password for root from 222.186.175.169 port 50514 ssh2 ... |
2020-01-05 13:28:15 |
| 118.24.210.254 | attackbots | Unauthorized connection attempt detected from IP address 118.24.210.254 to port 2220 [J] |
2020-01-05 13:50:30 |
| 78.210.143.54 | attackspambots | Feb 23 22:23:52 vpn sshd[11067]: Invalid user pi from 78.210.143.54 Feb 23 22:23:52 vpn sshd[11067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.210.143.54 Feb 23 22:23:52 vpn sshd[11069]: Invalid user pi from 78.210.143.54 Feb 23 22:23:52 vpn sshd[11069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.210.143.54 Feb 23 22:23:54 vpn sshd[11067]: Failed password for invalid user pi from 78.210.143.54 port 48776 ssh2 |
2020-01-05 13:46:44 |
| 78.211.128.54 | attack | Aug 3 14:34:08 vpn sshd[428]: Invalid user pi from 78.211.128.54 Aug 3 14:34:08 vpn sshd[429]: Invalid user pi from 78.211.128.54 Aug 3 14:34:08 vpn sshd[428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.211.128.54 Aug 3 14:34:08 vpn sshd[429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.211.128.54 Aug 3 14:34:10 vpn sshd[428]: Failed password for invalid user pi from 78.211.128.54 port 50672 ssh2 |
2020-01-05 13:45:44 |
| 128.14.152.43 | attack | 3389BruteforceFW21 |
2020-01-05 14:03:27 |