City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.246.90.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.246.90.11. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 23:33:39 CST 2025
;; MSG SIZE rcvd: 106
11.90.246.138.in-addr.arpa domain name pointer dhcp-138-246-90-11.dynamic.eduroam.mwn.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
11.90.246.138.in-addr.arpa name = dhcp-138-246-90-11.dynamic.eduroam.mwn.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.136.109.34 | attack | Sep 14 13:06:24 h2177944 kernel: \[1335650.017627\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.34 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=37097 PROTO=TCP SPT=43097 DPT=3653 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 14 13:16:24 h2177944 kernel: \[1336250.147299\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.34 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=65361 PROTO=TCP SPT=43097 DPT=3012 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 14 13:25:59 h2177944 kernel: \[1336825.250503\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.34 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=17113 PROTO=TCP SPT=43097 DPT=3747 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 14 13:28:25 h2177944 kernel: \[1336971.260260\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.34 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=39413 PROTO=TCP SPT=43097 DPT=3199 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 14 13:30:17 h2177944 kernel: \[1337082.934138\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.34 DST=85.214.117.9 |
2019-09-14 19:57:23 |
| 180.101.221.152 | attackspam | Sep 14 07:06:57 vps200512 sshd\[2690\]: Invalid user angry from 180.101.221.152 Sep 14 07:06:57 vps200512 sshd\[2690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.221.152 Sep 14 07:06:58 vps200512 sshd\[2690\]: Failed password for invalid user angry from 180.101.221.152 port 48708 ssh2 Sep 14 07:10:38 vps200512 sshd\[2804\]: Invalid user 123456 from 180.101.221.152 Sep 14 07:10:38 vps200512 sshd\[2804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.221.152 |
2019-09-14 19:22:45 |
| 185.126.180.241 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:03:50,129 INFO [amun_request_handler] PortScan Detected on Port: 445 (185.126.180.241) |
2019-09-14 19:23:53 |
| 138.99.19.243 | attackspambots | RDP Brute-Force (Grieskirchen RZ1) |
2019-09-14 19:18:03 |
| 193.169.255.131 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 10:13:27,465 INFO [amun_request_handler] PortScan Detected on Port: 25 (193.169.255.131) |
2019-09-14 19:32:56 |
| 206.167.33.12 | attack | Sep 14 07:12:53 debian sshd\[17952\]: Invalid user tess from 206.167.33.12 port 46010 Sep 14 07:12:53 debian sshd\[17952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.12 Sep 14 07:12:55 debian sshd\[17952\]: Failed password for invalid user tess from 206.167.33.12 port 46010 ssh2 ... |
2019-09-14 19:23:21 |
| 128.199.231.239 | attackbotsspam | Sep 14 07:03:13 xtremcommunity sshd\[73799\]: Invalid user slut from 128.199.231.239 port 33446 Sep 14 07:03:13 xtremcommunity sshd\[73799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.231.239 Sep 14 07:03:15 xtremcommunity sshd\[73799\]: Failed password for invalid user slut from 128.199.231.239 port 33446 ssh2 Sep 14 07:09:51 xtremcommunity sshd\[74079\]: Invalid user ftp from 128.199.231.239 port 49150 Sep 14 07:09:51 xtremcommunity sshd\[74079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.231.239 ... |
2019-09-14 19:25:14 |
| 82.102.165.134 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:02:46,249 INFO [amun_request_handler] PortScan Detected on Port: 445 (82.102.165.134) |
2019-09-14 19:28:12 |
| 1.55.46.222 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 06:48:40,962 INFO [shellcode_manager] (1.55.46.222) no match, writing hexdump (5af1e181fef810fc4f0ebd581e889a86 :1851490) - SMB (Unknown) |
2019-09-14 19:18:41 |
| 54.37.232.108 | attackbots | Sep 14 12:59:52 plex sshd[30684]: Invalid user adrc from 54.37.232.108 port 55696 |
2019-09-14 19:02:54 |
| 89.189.148.26 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:07:57,656 INFO [amun_request_handler] PortScan Detected on Port: 445 (89.189.148.26) |
2019-09-14 19:04:03 |
| 120.132.29.195 | attackspambots | Sep 14 00:56:18 auw2 sshd\[29978\]: Invalid user manager from 120.132.29.195 Sep 14 00:56:18 auw2 sshd\[29978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.29.195 Sep 14 00:56:20 auw2 sshd\[29978\]: Failed password for invalid user manager from 120.132.29.195 port 48798 ssh2 Sep 14 01:00:39 auw2 sshd\[30369\]: Invalid user sybase from 120.132.29.195 Sep 14 01:00:39 auw2 sshd\[30369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.29.195 |
2019-09-14 19:09:52 |
| 139.59.17.118 | attackbotsspam | Sep 14 11:30:23 vps01 sshd[451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.17.118 Sep 14 11:30:25 vps01 sshd[451]: Failed password for invalid user hamdan from 139.59.17.118 port 34164 ssh2 |
2019-09-14 19:13:01 |
| 196.188.72.63 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 04:54:41,789 INFO [amun_request_handler] PortScan Detected on Port: 445 (196.188.72.63) |
2019-09-14 19:43:40 |
| 112.116.155.205 | attackbots | Sep 14 12:37:27 markkoudstaal sshd[22903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.116.155.205 Sep 14 12:37:29 markkoudstaal sshd[22903]: Failed password for invalid user abhijit from 112.116.155.205 port 18852 ssh2 Sep 14 12:41:49 markkoudstaal sshd[23403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.116.155.205 |
2019-09-14 19:49:09 |