City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.201.246.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.201.246.194. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:45:31 CST 2025
;; MSG SIZE rcvd: 108
194.246.201.138.in-addr.arpa domain name pointer b2norsdl.myraidbox.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
194.246.201.138.in-addr.arpa name = b2norsdl.myraidbox.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 150.107.149.11 | attack | [N1.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-09-27 16:48:53 |
| 104.198.16.231 | attackspam | Sep 27 06:47:29 XXX sshd[57128]: Invalid user xiao from 104.198.16.231 port 55476 |
2020-09-27 16:18:25 |
| 51.89.149.241 | attack | "Unauthorized connection attempt on SSHD detected" |
2020-09-27 16:47:40 |
| 138.197.214.200 | attackspambots | [MK-VM5] Blocked by UFW |
2020-09-27 16:11:15 |
| 138.68.238.242 | attackbotsspam | 138.68.238.242 (US/United States/-), 3 distributed sshd attacks on account [ubuntu] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 27 02:25:25 internal2 sshd[15588]: Invalid user ubuntu from 138.68.238.242 port 38944 Sep 27 02:27:05 internal2 sshd[16711]: Invalid user ubuntu from 182.254.178.192 port 41334 Sep 27 01:59:47 internal2 sshd[26825]: Invalid user ubuntu from 107.170.99.119 port 39476 IP Addresses Blocked: |
2020-09-27 16:35:01 |
| 125.227.131.15 | attackbotsspam | 1601171691 - 09/27/2020 03:54:51 Host: 125.227.131.15/125.227.131.15 Port: 23 TCP Blocked ... |
2020-09-27 16:17:38 |
| 52.188.65.136 | attack | Sep 27 07:13:44 web1 sshd[26199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.188.65.136 user=root Sep 27 07:13:46 web1 sshd[26199]: Failed password for root from 52.188.65.136 port 63640 ssh2 Sep 27 07:13:44 web1 sshd[26204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.188.65.136 user=root Sep 27 07:13:46 web1 sshd[26204]: Failed password for root from 52.188.65.136 port 63645 ssh2 Sep 27 17:15:37 web1 sshd[1973]: Invalid user 148 from 52.188.65.136 port 1406 Sep 27 17:15:37 web1 sshd[1976]: Invalid user 148 from 52.188.65.136 port 1411 Sep 27 17:15:37 web1 sshd[1973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.188.65.136 Sep 27 17:15:37 web1 sshd[1973]: Invalid user 148 from 52.188.65.136 port 1406 Sep 27 17:15:39 web1 sshd[1973]: Failed password for invalid user 148 from 52.188.65.136 port 1406 ssh2 ... |
2020-09-27 16:10:06 |
| 117.144.189.69 | attack | Sep 27 10:14:12 vpn01 sshd[10805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.144.189.69 Sep 27 10:14:15 vpn01 sshd[10805]: Failed password for invalid user hdfs from 117.144.189.69 port 37765 ssh2 ... |
2020-09-27 16:18:08 |
| 157.245.227.165 | attack | Invalid user adriana from 157.245.227.165 port 56268 |
2020-09-27 16:10:26 |
| 91.121.30.96 | attack | Sep 27 10:57:21 dignus sshd[30361]: Failed password for invalid user install from 91.121.30.96 port 51874 ssh2 Sep 27 11:00:47 dignus sshd[30635]: Invalid user jacky from 91.121.30.96 port 60522 Sep 27 11:00:47 dignus sshd[30635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.30.96 Sep 27 11:00:49 dignus sshd[30635]: Failed password for invalid user jacky from 91.121.30.96 port 60522 ssh2 Sep 27 11:04:05 dignus sshd[30831]: Invalid user adrian from 91.121.30.96 port 40778 ... |
2020-09-27 16:10:50 |
| 64.227.7.123 | attackspambots | 64.227.7.123 - - [27/Sep/2020:05:56:22 +0100] "POST /wp-login.php HTTP/1.1" 200 2172 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 64.227.7.123 - - [27/Sep/2020:05:56:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2199 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 64.227.7.123 - - [27/Sep/2020:05:56:24 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-27 16:22:59 |
| 90.127.136.228 | attackspam | Invalid user admin from 90.127.136.228 port 48326 |
2020-09-27 16:15:11 |
| 103.233.92.5 | attackbotsspam | Listed on abuseat.org plus zen-spamhaus / proto=6 . srcport=63547 . dstport=445 . (2655) |
2020-09-27 16:44:29 |
| 195.154.174.175 | attack | 195.154.174.175 (FR/France/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 27 04:37:45 jbs1 sshd[19507]: Failed password for root from 167.179.184.102 port 48162 ssh2 Sep 27 04:30:56 jbs1 sshd[17447]: Failed password for root from 49.233.11.112 port 59302 ssh2 Sep 27 04:46:48 jbs1 sshd[22320]: Failed password for root from 195.154.174.175 port 41960 ssh2 Sep 27 04:30:54 jbs1 sshd[17447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.11.112 user=root Sep 27 04:46:10 jbs1 sshd[22134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.23.220 user=root Sep 27 04:46:12 jbs1 sshd[22134]: Failed password for root from 110.78.23.220 port 44290 ssh2 IP Addresses Blocked: 167.179.184.102 (AU/Australia/-) 49.233.11.112 (CN/China/-) |
2020-09-27 16:50:01 |
| 102.182.80.8 | attackspam | Fail2Ban Ban Triggered |
2020-09-27 16:42:30 |