City: unknown
Region: unknown
Country: Germany
Internet Service Provider: Universitaet Leipzig
Hostname: unknown
Organization: unknown
Usage Type: University/College/School
Type | Details | Datetime |
---|---|---|
attackbotsspam | Nov 27 19:50:54 firewall sshd[17158]: Invalid user server from 139.18.76.108 Nov 27 19:50:57 firewall sshd[17158]: Failed password for invalid user server from 139.18.76.108 port 57304 ssh2 Nov 27 19:56:49 firewall sshd[17281]: Invalid user server from 139.18.76.108 ... |
2019-11-28 09:00:17 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.18.76.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38280
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.18.76.108. IN A
;; AUTHORITY SECTION:
. 575 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019112701 1800 900 604800 86400
;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 28 09:00:14 CST 2019
;; MSG SIZE rcvd: 117
108.76.18.139.in-addr.arpa domain name pointer bbzws08.bbz.uni-leipzig.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
108.76.18.139.in-addr.arpa name = bbzws08.bbz.uni-leipzig.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
111.229.4.247 | attackspambots | Sep 11 08:50:13 vpn01 sshd[24100]: Failed password for root from 111.229.4.247 port 58061 ssh2 ... |
2020-09-11 17:56:16 |
216.10.242.177 | attackbotsspam | SIP/5060 Probe, BF, Hack - |
2020-09-11 17:54:38 |
165.22.216.139 | attackspambots | 165.22.216.139 - - [11/Sep/2020:10:17:32 +0200] "GET /wp-login.php HTTP/1.1" 200 9184 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.22.216.139 - - [11/Sep/2020:10:17:35 +0200] "POST /wp-login.php HTTP/1.1" 200 9435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.22.216.139 - - [11/Sep/2020:10:17:42 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-09-11 17:42:08 |
177.200.66.124 | attack | Sep 8 17:29:36 mail.srvfarm.net postfix/smtpd[1881910]: warning: 177-200-66-124.dynamic.skysever.com.br[177.200.66.124]: SASL PLAIN authentication failed: Sep 8 17:29:37 mail.srvfarm.net postfix/smtpd[1881910]: lost connection after AUTH from 177-200-66-124.dynamic.skysever.com.br[177.200.66.124] Sep 8 17:32:17 mail.srvfarm.net postfix/smtps/smtpd[1886512]: warning: 177-200-66-124.dynamic.skysever.com.br[177.200.66.124]: SASL PLAIN authentication failed: Sep 8 17:32:18 mail.srvfarm.net postfix/smtps/smtpd[1886512]: lost connection after AUTH from 177-200-66-124.dynamic.skysever.com.br[177.200.66.124] Sep 8 17:34:38 mail.srvfarm.net postfix/smtps/smtpd[1885700]: warning: 177-200-66-124.dynamic.skysever.com.br[177.200.66.124]: SASL PLAIN authentication failed: |
2020-09-11 18:00:15 |
218.92.0.168 | attack | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-11 17:40:54 |
185.220.102.6 | attack | 2020-09-11T09:10[Censored Hostname] sshd[1784]: Failed password for root from 185.220.102.6 port 41467 ssh2 2020-09-11T09:10[Censored Hostname] sshd[1784]: Failed password for root from 185.220.102.6 port 41467 ssh2 2020-09-11T09:10[Censored Hostname] sshd[1784]: Failed password for root from 185.220.102.6 port 41467 ssh2[...] |
2020-09-11 17:40:05 |
94.102.57.137 | attackspambots | POP3 |
2020-09-11 18:05:11 |
178.44.156.177 | attack | Sep 10 18:52:20 * sshd[14239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.44.156.177 Sep 10 18:52:22 * sshd[14239]: Failed password for invalid user pi from 178.44.156.177 port 33916 ssh2 |
2020-09-11 17:48:31 |
41.226.255.216 | attackspam | Icarus honeypot on github |
2020-09-11 17:46:16 |
114.104.227.102 | attack | Sep 10 20:07:52 srv01 postfix/smtpd\[30416\]: warning: unknown\[114.104.227.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 10 20:11:18 srv01 postfix/smtpd\[4799\]: warning: unknown\[114.104.227.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 10 20:11:30 srv01 postfix/smtpd\[4799\]: warning: unknown\[114.104.227.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 10 20:11:46 srv01 postfix/smtpd\[4799\]: warning: unknown\[114.104.227.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 10 20:12:05 srv01 postfix/smtpd\[4799\]: warning: unknown\[114.104.227.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-11 17:54:26 |
155.4.202.254 | attack | Sep 10 18:52:19 * sshd[14233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.4.202.254 Sep 10 18:52:21 * sshd[14233]: Failed password for invalid user osmc from 155.4.202.254 port 57237 ssh2 |
2020-09-11 17:49:06 |
45.142.120.137 | attackbots | Sep 9 04:31:16 websrv1.aknwsrv.net postfix/smtpd[1696243]: warning: unknown[45.142.120.137]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 04:31:54 websrv1.aknwsrv.net postfix/smtpd[1696243]: warning: unknown[45.142.120.137]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 04:32:34 websrv1.aknwsrv.net postfix/smtpd[1696243]: warning: unknown[45.142.120.137]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 04:33:13 websrv1.aknwsrv.net postfix/smtpd[1696243]: warning: unknown[45.142.120.137]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 04:33:52 websrv1.aknwsrv.net postfix/smtpd[1696243]: warning: unknown[45.142.120.137]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-09-11 18:09:15 |
78.128.113.120 | attackspam | Sep 10 15:55:39 mail.srvfarm.net postfix/smtpd[3145219]: warning: unknown[78.128.113.120]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 10 15:55:39 mail.srvfarm.net postfix/smtpd[3145219]: lost connection after AUTH from unknown[78.128.113.120] Sep 10 15:55:44 mail.srvfarm.net postfix/smtpd[3143533]: lost connection after AUTH from unknown[78.128.113.120] Sep 10 15:55:48 mail.srvfarm.net postfix/smtpd[3143534]: lost connection after AUTH from unknown[78.128.113.120] Sep 10 15:55:53 mail.srvfarm.net postfix/smtpd[3143533]: lost connection after AUTH from unknown[78.128.113.120] |
2020-09-11 18:07:26 |
45.142.120.61 | attackspam | Sep 9 03:46:57 web01.agentur-b-2.de postfix/smtpd[3556337]: warning: unknown[45.142.120.61]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 03:47:39 web01.agentur-b-2.de postfix/smtpd[3556337]: warning: unknown[45.142.120.61]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 03:48:19 web01.agentur-b-2.de postfix/smtpd[3560732]: warning: unknown[45.142.120.61]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 03:48:59 web01.agentur-b-2.de postfix/smtpd[3555621]: warning: unknown[45.142.120.61]: SASL LOGIN authentication failed: VXNlcm5hbWU6 Sep 9 03:49:39 web01.agentur-b-2.de postfix/smtpd[3557438]: warning: unknown[45.142.120.61]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-09-11 18:10:57 |
132.232.132.103 | attackbots | ... |
2020-09-11 17:51:08 |