City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.76.9.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.76.9.14. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:54:04 CST 2022
;; MSG SIZE rcvd: 104
14.9.76.134.in-addr.arpa domain name pointer maxcineapp.ab.mpg.de.
14.9.76.134.in-addr.arpa domain name pointer baug-umg.de.
14.9.76.134.in-addr.arpa domain name pointer studieren-in-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer num-bfast.de.
14.9.76.134.in-addr.arpa domain name pointer farmerspace.uni-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer open-forecast.eu.
14.9.76.134.in-addr.arpa domain name pointer stiftung-ernst-waldschmidt.de.
14.9.76.134.in-addr.arpa domain name pointer atng.org.
14.9.76.134.in-addr.arpa domain name pointer vweb14.gwdg.de.
14.9.76.134.in-addr.arpa domain name pointer universitaetsenergie.de.
14.9.76.134.in-addr.arpa domain name pointer litlog.de.
14.9.76.134.in-addr.arpa domain name pointer pilz.uni-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer eni.gwdg.de.
14.9.76.134.in-addr.arpa domain name pointer ip4.gwdg.de.
14.9.76.134.in-addr.arpa domain name pointer studium-in-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer n2-networ
b';; Truncated, retrying in TCP mode.
14.9.76.134.in-addr.arpa name = welcome-to-suedniedersachsen.de.
14.9.76.134.in-addr.arpa name = litlog.de.
14.9.76.134.in-addr.arpa name = d-tras.eu.
14.9.76.134.in-addr.arpa name = europar.org.
14.9.76.134.in-addr.arpa name = hochschul-cio.de.
14.9.76.134.in-addr.arpa name = n2-network.net.
14.9.76.134.in-addr.arpa name = ifnano.de.
14.9.76.134.in-addr.arpa name = num-bfast.de.
14.9.76.134.in-addr.arpa name = dtras.eu.
14.9.76.134.in-addr.arpa name = pilz.uni-goettingen.de.
14.9.76.134.in-addr.arpa name = maxcineapp.ab.mpg.de.
14.9.76.134.in-addr.arpa name = farmerspace.uni-goettingen.de.
14.9.76.134.in-addr.arpa name = atng.org.
14.9.76.134.in-addr.arpa name = studieren-in-goettingen.de.
14.9.76.134.in-addr.arpa name = open-forecast.eu.
14.9.76.134.in-addr.arpa name = euro-par.org.
14.9.76.134.in-addr.arpa name = universitaetsenergie.de.
14.9.76.134.in-addr.arpa name = baug-umg.de.
14.9.76.134.in-addr.arpa name = ip4.gwdg.de.
14.9.76.134.in-addr.arpa name = studium-in-goettingen.de.
14.9.76.134.in-addr.arpa name = eni.gwdg.de.
14.9.76.134.in-addr.arpa name = vweb14.gwdg.de.
14.9.76.134.in-addr.arpa name = co3learn.de.
14.9.76.134.in-addr.arpa name = studiumingoettingen.de.
14.9.76.134.in-addr.arpa name = stiftung-ernst-waldschmidt.de.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 37.123.163.106 | attackbots | Apr 19 16:02:55 lukav-desktop sshd\[3128\]: Invalid user sw from 37.123.163.106 Apr 19 16:02:55 lukav-desktop sshd\[3128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.123.163.106 Apr 19 16:02:57 lukav-desktop sshd\[3128\]: Failed password for invalid user sw from 37.123.163.106 port 13645 ssh2 Apr 19 16:07:29 lukav-desktop sshd\[10892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.123.163.106 user=root Apr 19 16:07:32 lukav-desktop sshd\[10892\]: Failed password for root from 37.123.163.106 port 13645 ssh2 |
2020-04-19 23:18:17 |
| 159.203.59.38 | attack | Apr 19 14:16:27 124388 sshd[30299]: Invalid user admin1 from 159.203.59.38 port 33568 Apr 19 14:16:27 124388 sshd[30299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.59.38 Apr 19 14:16:27 124388 sshd[30299]: Invalid user admin1 from 159.203.59.38 port 33568 Apr 19 14:16:29 124388 sshd[30299]: Failed password for invalid user admin1 from 159.203.59.38 port 33568 ssh2 Apr 19 14:20:52 124388 sshd[30446]: Invalid user hu from 159.203.59.38 port 33444 |
2020-04-19 22:56:38 |
| 123.150.244.226 | attack | SSH bruteforce (Triggered fail2ban) |
2020-04-19 22:55:22 |
| 217.182.95.16 | attackspambots | SSH brutforce |
2020-04-19 22:59:08 |
| 51.68.229.73 | attack | Apr 19 07:54:57 NPSTNNYC01T sshd[2110]: Failed password for root from 51.68.229.73 port 42520 ssh2 Apr 19 07:59:00 NPSTNNYC01T sshd[2513]: Failed password for root from 51.68.229.73 port 60608 ssh2 ... |
2020-04-19 22:58:42 |
| 212.92.106.176 | attackspambots | 0,16-01/02 [bc01/m10] PostRequest-Spammer scoring: zurich |
2020-04-19 22:48:01 |
| 46.229.168.141 | attackbots | Malicious Traffic/Form Submission |
2020-04-19 23:29:45 |
| 51.178.49.219 | attack | 2020-04-19T14:43:04.607469abusebot-7.cloudsearch.cf sshd[19649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.ip-51-178-49.eu user=root 2020-04-19T14:43:06.491069abusebot-7.cloudsearch.cf sshd[19649]: Failed password for root from 51.178.49.219 port 49402 ssh2 2020-04-19T14:47:19.996213abusebot-7.cloudsearch.cf sshd[20232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.ip-51-178-49.eu user=root 2020-04-19T14:47:21.884478abusebot-7.cloudsearch.cf sshd[20232]: Failed password for root from 51.178.49.219 port 59722 ssh2 2020-04-19T14:49:40.974381abusebot-7.cloudsearch.cf sshd[20483]: Invalid user by from 51.178.49.219 port 37042 2020-04-19T14:49:40.979463abusebot-7.cloudsearch.cf sshd[20483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.ip-51-178-49.eu 2020-04-19T14:49:40.974381abusebot-7.cloudsearch.cf sshd[20483]: Invalid user by from 51.178.49.21 ... |
2020-04-19 23:15:54 |
| 49.232.163.88 | attack | Apr 19 13:57:28 * sshd[21094]: Failed password for root from 49.232.163.88 port 47976 ssh2 Apr 19 14:03:07 * sshd[21909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.163.88 |
2020-04-19 22:47:18 |
| 49.88.112.113 | attack | Apr 19 10:39:26 plusreed sshd[6952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Apr 19 10:39:28 plusreed sshd[6952]: Failed password for root from 49.88.112.113 port 10993 ssh2 ... |
2020-04-19 22:48:27 |
| 35.202.92.255 | attackspambots | Apr 19 19:34:26 webhost01 sshd[25068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.202.92.255 Apr 19 19:34:29 webhost01 sshd[25068]: Failed password for invalid user postgres from 35.202.92.255 port 34984 ssh2 ... |
2020-04-19 23:26:55 |
| 183.83.85.102 | attackspam | 1587297785 - 04/19/2020 14:03:05 Host: 183.83.85.102/183.83.85.102 Port: 445 TCP Blocked |
2020-04-19 22:49:04 |
| 113.107.139.68 | attackspambots | " " |
2020-04-19 23:21:02 |
| 51.91.8.222 | attackbots | 3x Failed Password |
2020-04-19 23:28:20 |
| 118.27.13.39 | attackspambots | SSH Brute-Force attacks |
2020-04-19 22:50:12 |