City: Landau
Region: Rheinland-Pfalz
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.14.85.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61762
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.14.85.113. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019091700 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Sep 18 00:58:45 CST 2019
;; MSG SIZE rcvd: 117
Host 113.85.14.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 113.85.14.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
49.234.12.123 | attack | Apr 19 22:09:55 srv01 sshd[20724]: Invalid user ftpuser from 49.234.12.123 port 37970 Apr 19 22:09:55 srv01 sshd[20724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.12.123 Apr 19 22:09:55 srv01 sshd[20724]: Invalid user ftpuser from 49.234.12.123 port 37970 Apr 19 22:09:57 srv01 sshd[20724]: Failed password for invalid user ftpuser from 49.234.12.123 port 37970 ssh2 Apr 19 22:15:57 srv01 sshd[21083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.12.123 user=root Apr 19 22:15:59 srv01 sshd[21083]: Failed password for root from 49.234.12.123 port 47574 ssh2 ... |
2020-04-20 04:18:59 |
125.124.117.226 | attackbots | Invalid user admin from 125.124.117.226 port 42707 |
2020-04-20 04:12:43 |
120.36.251.122 | attackspambots | Invalid user sv from 120.36.251.122 port 13680 |
2020-04-20 04:14:22 |
121.229.20.84 | attackbots | Apr 19 17:57:27 plex sshd[24852]: Failed password for invalid user admin from 121.229.20.84 port 44112 ssh2 Apr 19 17:57:25 plex sshd[24852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.20.84 Apr 19 17:57:25 plex sshd[24852]: Invalid user admin from 121.229.20.84 port 44112 Apr 19 17:57:27 plex sshd[24852]: Failed password for invalid user admin from 121.229.20.84 port 44112 ssh2 Apr 19 18:00:42 plex sshd[24908]: Invalid user hadoop from 121.229.20.84 port 54784 |
2020-04-20 04:13:50 |
217.56.67.173 | attackbotsspam | Unauthorized connection attempt from IP address 217.56.67.173 on Port 445(SMB) |
2020-04-20 04:30:56 |
96.73.129.100 | attack | Apr 19 23:15:32 hosting sshd[24755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.73.129.100 user=root Apr 19 23:15:35 hosting sshd[24755]: Failed password for root from 96.73.129.100 port 15184 ssh2 Apr 19 23:25:11 hosting sshd[25914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.73.129.100 user=postgres Apr 19 23:25:13 hosting sshd[25914]: Failed password for postgres from 96.73.129.100 port 7588 ssh2 Apr 19 23:28:26 hosting sshd[25922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.73.129.100 user=postgres Apr 19 23:28:27 hosting sshd[25922]: Failed password for postgres from 96.73.129.100 port 26920 ssh2 ... |
2020-04-20 04:38:57 |
107.175.33.240 | attack | Apr 19 22:11:46 meumeu sshd[2966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.33.240 Apr 19 22:11:48 meumeu sshd[2966]: Failed password for invalid user zy from 107.175.33.240 port 51050 ssh2 Apr 19 22:15:47 meumeu sshd[3490]: Failed password for root from 107.175.33.240 port 46682 ssh2 ... |
2020-04-20 04:38:35 |
185.17.128.0 | attackspam | 1587327343 - 04/19/2020 22:15:43 Host: 185.17.128.0/185.17.128.0 Port: 445 TCP Blocked |
2020-04-20 04:45:58 |
119.8.7.11 | attack | Apr 16 09:31:02 lock-38 sshd[1071423]: Failed password for invalid user hank from 119.8.7.11 port 44022 ssh2 Apr 16 09:35:27 lock-38 sshd[1071555]: Invalid user teampspeak from 119.8.7.11 port 58032 Apr 16 09:35:27 lock-38 sshd[1071555]: Invalid user teampspeak from 119.8.7.11 port 58032 Apr 16 09:35:27 lock-38 sshd[1071555]: Failed password for invalid user teampspeak from 119.8.7.11 port 58032 ssh2 Apr 16 09:39:19 lock-38 sshd[1071709]: Failed password for root from 119.8.7.11 port 37000 ssh2 ... |
2020-04-20 04:15:11 |
106.13.236.70 | attackspam | Apr 19 22:17:07 mail sshd\[30538\]: Invalid user ftpuser from 106.13.236.70 Apr 19 22:17:07 mail sshd\[30538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.236.70 Apr 19 22:17:09 mail sshd\[30538\]: Failed password for invalid user ftpuser from 106.13.236.70 port 58430 ssh2 ... |
2020-04-20 04:29:39 |
134.209.71.245 | attack | Apr 19 13:00:27 mockhub sshd[15442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.71.245 Apr 19 13:00:29 mockhub sshd[15442]: Failed password for invalid user admin from 134.209.71.245 port 38844 ssh2 ... |
2020-04-20 04:11:25 |
31.14.131.141 | attack | 19.04.2020 22:15:54 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter |
2020-04-20 04:32:40 |
188.246.224.140 | attackspambots | odoo8 ... |
2020-04-20 04:31:50 |
118.89.108.152 | attackspambots | Apr 19 21:50:05 eventyay sshd[15520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.152 Apr 19 21:50:07 eventyay sshd[15520]: Failed password for invalid user test from 118.89.108.152 port 53868 ssh2 Apr 19 21:53:55 eventyay sshd[15659]: Failed password for postgres from 118.89.108.152 port 54234 ssh2 ... |
2020-04-20 04:15:35 |
5.39.93.158 | attackspam | 5x Failed Password |
2020-04-20 04:17:14 |