City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.76.9.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.76.9.14. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:54:04 CST 2022
;; MSG SIZE rcvd: 104
14.9.76.134.in-addr.arpa domain name pointer maxcineapp.ab.mpg.de.
14.9.76.134.in-addr.arpa domain name pointer baug-umg.de.
14.9.76.134.in-addr.arpa domain name pointer studieren-in-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer num-bfast.de.
14.9.76.134.in-addr.arpa domain name pointer farmerspace.uni-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer open-forecast.eu.
14.9.76.134.in-addr.arpa domain name pointer stiftung-ernst-waldschmidt.de.
14.9.76.134.in-addr.arpa domain name pointer atng.org.
14.9.76.134.in-addr.arpa domain name pointer vweb14.gwdg.de.
14.9.76.134.in-addr.arpa domain name pointer universitaetsenergie.de.
14.9.76.134.in-addr.arpa domain name pointer litlog.de.
14.9.76.134.in-addr.arpa domain name pointer pilz.uni-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer eni.gwdg.de.
14.9.76.134.in-addr.arpa domain name pointer ip4.gwdg.de.
14.9.76.134.in-addr.arpa domain name pointer studium-in-goettingen.de.
14.9.76.134.in-addr.arpa domain name pointer n2-networ
b';; Truncated, retrying in TCP mode.
14.9.76.134.in-addr.arpa name = welcome-to-suedniedersachsen.de.
14.9.76.134.in-addr.arpa name = litlog.de.
14.9.76.134.in-addr.arpa name = d-tras.eu.
14.9.76.134.in-addr.arpa name = europar.org.
14.9.76.134.in-addr.arpa name = hochschul-cio.de.
14.9.76.134.in-addr.arpa name = n2-network.net.
14.9.76.134.in-addr.arpa name = ifnano.de.
14.9.76.134.in-addr.arpa name = num-bfast.de.
14.9.76.134.in-addr.arpa name = dtras.eu.
14.9.76.134.in-addr.arpa name = pilz.uni-goettingen.de.
14.9.76.134.in-addr.arpa name = maxcineapp.ab.mpg.de.
14.9.76.134.in-addr.arpa name = farmerspace.uni-goettingen.de.
14.9.76.134.in-addr.arpa name = atng.org.
14.9.76.134.in-addr.arpa name = studieren-in-goettingen.de.
14.9.76.134.in-addr.arpa name = open-forecast.eu.
14.9.76.134.in-addr.arpa name = euro-par.org.
14.9.76.134.in-addr.arpa name = universitaetsenergie.de.
14.9.76.134.in-addr.arpa name = baug-umg.de.
14.9.76.134.in-addr.arpa name = ip4.gwdg.de.
14.9.76.134.in-addr.arpa name = studium-in-goettingen.de.
14.9.76.134.in-addr.arpa name = eni.gwdg.de.
14.9.76.134.in-addr.arpa name = vweb14.gwdg.de.
14.9.76.134.in-addr.arpa name = co3learn.de.
14.9.76.134.in-addr.arpa name = studiumingoettingen.de.
14.9.76.134.in-addr.arpa name = stiftung-ernst-waldschmidt.de.
Authoritative answers can be found from:
'
IP | Type | Details | Datetime |
---|---|---|---|
49.70.162.150 | attackspambots | Honeypot attack, port: 81, PTR: PTR record not found |
2020-03-03 09:20:01 |
139.59.61.186 | attackspam | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-03-03 09:29:21 |
112.119.243.98 | attackbots | Unauthorized connection attempt detected from IP address 112.119.243.98 to port 5555 [J] |
2020-03-03 09:22:34 |
202.51.98.226 | attack | Mar 3 04:28:17 areeb-Workstation sshd[28171]: Failed password for speech-dispatcher from 202.51.98.226 port 33412 ssh2 ... |
2020-03-03 08:54:00 |
216.250.119.85 | attackspambots | Mar 3 00:17:05 IngegnereFirenze sshd[17567]: Failed password for invalid user ubuntu from 216.250.119.85 port 58806 ssh2 ... |
2020-03-03 09:29:06 |
103.253.1.227 | attack | Unauthorized connection attempt detected from IP address 103.253.1.227 to port 5555 [J] |
2020-03-03 09:27:28 |
167.250.72.34 | attack | SSH attack |
2020-03-03 09:00:47 |
210.48.146.61 | attackbots | Mar 3 01:54:34 web1 sshd\[4190\]: Invalid user ftpuser from 210.48.146.61 Mar 3 01:54:34 web1 sshd\[4190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61 Mar 3 01:54:37 web1 sshd\[4190\]: Failed password for invalid user ftpuser from 210.48.146.61 port 49028 ssh2 Mar 3 01:58:28 web1 sshd\[4350\]: Invalid user www from 210.48.146.61 Mar 3 01:58:28 web1 sshd\[4350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61 |
2020-03-03 09:23:46 |
207.107.139.150 | attack | Mar 2 23:03:56 [snip] sshd[4421]: Invalid user onion from 207.107.139.150 port 43232 Mar 2 23:03:56 [snip] sshd[4421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.107.139.150 Mar 2 23:03:58 [snip] sshd[4421]: Failed password for invalid user onion from 207.107.139.150 port 43232 ssh2[...] |
2020-03-03 09:03:40 |
116.104.32.122 | attackbots | Unauthorized connection attempt detected from IP address 116.104.32.122 to port 23 [J] |
2020-03-03 08:55:44 |
92.118.161.17 | attackbots | Unauthorized connection attempt detected from IP address 92.118.161.17 to port 7547 [J] |
2020-03-03 08:58:58 |
203.76.132.186 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 02-03-2020 22:00:12. |
2020-03-03 08:57:17 |
61.160.245.87 | attackbots | Mar 2 13:36:28 web1 sshd\[22417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.245.87 user=root Mar 2 13:36:31 web1 sshd\[22417\]: Failed password for root from 61.160.245.87 port 37376 ssh2 Mar 2 13:45:43 web1 sshd\[23301\]: Invalid user ts6 from 61.160.245.87 Mar 2 13:45:43 web1 sshd\[23301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.245.87 Mar 2 13:45:44 web1 sshd\[23301\]: Failed password for invalid user ts6 from 61.160.245.87 port 35662 ssh2 |
2020-03-03 09:26:40 |
114.23.220.120 | attack | (sshd) Failed SSH login from 114.23.220.120 (NZ/New Zealand/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 3 01:55:58 amsweb01 sshd[8863]: Invalid user www from 114.23.220.120 port 36902 Mar 3 01:56:00 amsweb01 sshd[8863]: Failed password for invalid user www from 114.23.220.120 port 36902 ssh2 Mar 3 01:59:53 amsweb01 sshd[9189]: User admin from 114.23.220.120 not allowed because not listed in AllowUsers Mar 3 01:59:54 amsweb01 sshd[9189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.23.220.120 user=admin Mar 3 01:59:56 amsweb01 sshd[9189]: Failed password for invalid user admin from 114.23.220.120 port 36274 ssh2 |
2020-03-03 09:11:47 |
58.244.107.61 | attackspambots | firewall-block, port(s): 23/tcp |
2020-03-03 09:07:05 |