City: unknown
Region: unknown
Country: Germany
Internet Service Provider: Ludwig-Maximilians-Universitaet Muenchen
Hostname: unknown
Organization: unknown
Usage Type: University/College/School
Type | Details | Datetime |
---|---|---|
attackspam | 8 web app probes over 24 hour period. |
2020-09-25 10:34:17 |
attackbots | CF RAY ID: 5ccfd7a5f8c6eda7 IP Class: unknown URI: / |
2020-09-04 04:21:27 |
attack | Unauthorized connection attempt detected from IP address 138.246.253.15 to port 443 [T] |
2020-09-03 20:03:51 |
attackbotsspam | CF RAY ID: 5be922ac2e11d44f IP Class: unknown URI: / |
2020-08-06 23:50:03 |
attackspambots | Unauthorized connection attempt detected from IP address 138.246.253.15 to port 443 |
2020-06-24 00:44:02 |
attackspambots | 138.246.253.15 - - [14/Apr/2020:15:20:12 +0200] "HEAD / HTTP/1.1" 400 3592 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.85 Safari/537.36" |
2020-04-14 23:19:21 |
attackbotsspam | port scan and connect, tcp 443 (https) |
2020-03-05 15:32:29 |
IP | Type | Details | Datetime |
---|---|---|---|
138.246.253.7 | attackbotsspam |
|
2020-08-13 01:56:06 |
138.246.253.21 | attackspambots | Port scan on 1 port(s): 53 |
2020-04-08 05:41:02 |
138.246.253.21 | attack | Port scan on 1 port(s): 53 |
2020-03-31 23:58:37 |
138.246.253.5 | attackspam | From CCTV User Interface Log ...::ffff:138.246.253.5 - - [20/Mar/2020:09:06:43 +0000] "-" 400 179 ... |
2020-03-21 04:04:27 |
138.246.253.5 | attack | 138.246.253.5 - - [23/Feb/2020:12:13:07 -0500] "HEAD / HTTP/1.1" 500 - "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.85 Safari/537.36" |
2020-02-24 05:41:47 |
138.246.253.10 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-19 22:38:30 |
138.246.253.21 | attack | Port scan on 1 port(s): 53 |
2020-02-13 23:20:48 |
138.246.253.21 | attack | Port scan on 1 port(s): 53 |
2020-01-20 15:52:05 |
138.246.253.5 | attackspambots | The IP has triggered Cloudflare WAF. CF-Ray: 54172b9bff56c29f | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: DE | CF_IPClass: unknown | Protocol: HTTP/1.1 | Method: HEAD | Host: d.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.85 Safari/537.36 | CF_DC: FRA. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-08 03:48:13 |
138.246.253.5 | attackspam | Open Proxy "PROMETHEUS" Node. |
2019-11-04 18:34:33 |
138.246.253.5 | attack | UTC: 2019-10-21 port: 443/tcp |
2019-10-22 13:54:40 |
138.246.253.21 | attack | *Port Scan* detected from 138.246.253.21 (DE/Germany/planetlab21.net.in.tum.de). 5 hits in the last 270 seconds |
2019-10-16 05:00:35 |
138.246.253.21 | attackbotsspam | Port scan on 1 port(s): 53 |
2019-09-07 16:08:43 |
138.246.253.5 | attack | firewall-block_invalid_GET_Request |
2019-08-07 10:37:17 |
138.246.253.5 | attack | scans system |
2019-07-19 20:01:02 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.246.253.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39050
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.246.253.15. IN A
;; AUTHORITY SECTION:
. 543 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020030500 1800 900 604800 86400
;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 05 15:32:21 CST 2020
;; MSG SIZE rcvd: 118
15.253.246.138.in-addr.arpa domain name pointer planetlab15.net.in.tum.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
15.253.246.138.in-addr.arpa name = planetlab15.net.in.tum.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
136.244.64.173 | attack | Unauthorized connection attempt detected from IP address 136.244.64.173 to port 3389 |
2020-05-20 09:19:41 |
106.46.61.72 | attackbots | Unauthorized connection attempt detected from IP address 106.46.61.72 to port 139 [T] |
2020-05-20 09:28:23 |
111.224.235.214 | attackbots | Unauthorized connection attempt detected from IP address 111.224.235.214 to port 3780 [T] |
2020-05-20 09:56:35 |
51.75.52.127 | attack | Automatic report - Banned IP Access |
2020-05-20 09:32:14 |
180.218.104.151 | attackbotsspam | Unauthorized connection attempt detected from IP address 180.218.104.151 to port 88 [T] |
2020-05-20 09:44:53 |
112.117.29.252 | attack | Automatic report - Port Scan Attack |
2020-05-20 09:56:15 |
92.63.194.79 | attackbots | Unauthorized connection attempt detected from IP address 92.63.194.79 to port 5900 |
2020-05-20 09:31:18 |
123.160.196.19 | attackbotsspam | Unauthorized connection attempt detected from IP address 123.160.196.19 to port 139 [T] |
2020-05-20 09:24:00 |
1.196.140.43 | attack | Unauthorized connection attempt detected from IP address 1.196.140.43 to port 139 [T] |
2020-05-20 09:37:30 |
218.89.222.16 | attackspambots | Unauthorized connection attempt detected from IP address 218.89.222.16 to port 1433 [T] |
2020-05-20 09:41:24 |
125.112.47.76 | attackspam | Unauthorized connection attempt detected from IP address 125.112.47.76 to port 445 [T] |
2020-05-20 09:48:51 |
1.192.100.152 | attackspam | Unauthorized connection attempt detected from IP address 1.192.100.152 to port 139 [T] |
2020-05-20 09:37:54 |
106.42.97.127 | attackbots | Unauthorized connection attempt detected from IP address 106.42.97.127 to port 139 [T] |
2020-05-20 09:29:55 |
39.64.244.249 | attackbots | Unauthorized connection attempt detected from IP address 39.64.244.249 to port 22 [T] |
2020-05-20 09:35:11 |
180.120.218.67 | attackspam | Unauthorized connection attempt detected from IP address 180.120.218.67 to port 23 [T] |
2020-05-20 09:45:31 |