City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.2.84.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.2.84.225. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 00:51:29 CST 2025
;; MSG SIZE rcvd: 105
225.84.2.141.in-addr.arpa domain name pointer cw-hafen-84-225.rz.uni-frankfurt.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
225.84.2.141.in-addr.arpa name = cw-hafen-84-225.rz.uni-frankfurt.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 201.245.172.74 | attackbotsspam | DATE:2019-06-23 07:46:55, IP:201.245.172.74, PORT:ssh brute force auth on SSH service (patata) |
2019-06-23 14:16:11 |
| 118.24.219.111 | attackbotsspam | Jun 23 00:08:12 ip-172-31-1-72 sshd\[29804\]: Invalid user test from 118.24.219.111 Jun 23 00:08:12 ip-172-31-1-72 sshd\[29804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.219.111 Jun 23 00:08:15 ip-172-31-1-72 sshd\[29804\]: Failed password for invalid user test from 118.24.219.111 port 40458 ssh2 Jun 23 00:10:53 ip-172-31-1-72 sshd\[30137\]: Invalid user ov from 118.24.219.111 Jun 23 00:10:53 ip-172-31-1-72 sshd\[30137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.219.111 |
2019-06-23 14:32:05 |
| 150.242.213.189 | attackspambots | ports scanning |
2019-06-23 13:50:14 |
| 41.39.175.150 | attack | Automatic report - Web App Attack |
2019-06-23 14:15:47 |
| 162.243.20.243 | attackspam | Jun 23 02:17:15 unicornsoft sshd\[15361\]: Invalid user cirros from 162.243.20.243 Jun 23 02:17:15 unicornsoft sshd\[15361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.20.243 Jun 23 02:17:17 unicornsoft sshd\[15361\]: Failed password for invalid user cirros from 162.243.20.243 port 56416 ssh2 |
2019-06-23 14:40:31 |
| 179.108.240.126 | attackbotsspam | $f2bV_matches |
2019-06-23 14:06:55 |
| 220.76.205.178 | attack | Jun 23 02:08:10 mail1 sshd\[21852\]: Invalid user istclass from 220.76.205.178 port 52277 Jun 23 02:08:10 mail1 sshd\[21852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.178 Jun 23 02:08:12 mail1 sshd\[21852\]: Failed password for invalid user istclass from 220.76.205.178 port 52277 ssh2 Jun 23 02:12:06 mail1 sshd\[23652\]: Invalid user fabio from 220.76.205.178 port 43741 Jun 23 02:12:06 mail1 sshd\[23652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.178 ... |
2019-06-23 13:59:41 |
| 27.78.213.21 | attack | 445/tcp [2019-06-22]1pkt |
2019-06-23 14:19:16 |
| 80.211.240.230 | attack | Jun 23 05:24:11 vpn01 sshd\[23629\]: Invalid user marthe from 80.211.240.230 Jun 23 05:24:11 vpn01 sshd\[23629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.240.230 Jun 23 05:24:13 vpn01 sshd\[23629\]: Failed password for invalid user marthe from 80.211.240.230 port 53334 ssh2 |
2019-06-23 13:52:17 |
| 113.161.35.144 | attackbots | SSH Bruteforce @ SigaVPN honeypot |
2019-06-23 14:07:57 |
| 109.229.2.63 | attack | Jun 18 04:53:31 mail01 postfix/postscreen[2378]: CONNECT from [109.229.2.63]:34136 to [94.130.181.95]:25 Jun 18 04:53:31 mail01 postfix/dnsblog[2379]: addr 109.229.2.63 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jun 18 04:53:31 mail01 postfix/postscreen[2378]: PREGREET 22 after 0.14 from [109.229.2.63]:34136: EHLO 2000hotmail.com Jun 18 04:53:32 mail01 postfix/dnsblog[2381]: addr 109.229.2.63 listed by domain zen.spamhaus.org as 127.0.0.3 Jun 18 04:53:32 mail01 postfix/dnsblog[2381]: addr 109.229.2.63 listed by domain zen.spamhaus.org as 127.0.0.11 Jun 18 04:53:32 mail01 postfix/dnsblog[2381]: addr 109.229.2.63 listed by domain zen.spamhaus.org as 127.0.0.4 Jun 18 04:53:32 mail01 postfix/postscreen[2378]: DNSBL rank 4 for [109.229.2.63]:34136 Jun x@x Jun x@x Jun 18 04:53:33 mail01 postfix/postscreen[2378]: HANGUP after 0.55 from [109.229.2.63]:34136 in tests after SMTP handshake Jun 18 04:53:33 mail01 postfix/postscreen[2378]: DISCONNECT [109.229.2.63]:34136 ........ -------------------------------- |
2019-06-23 14:09:11 |
| 81.22.45.135 | attackspam | 3389/tcp 3389/tcp 3389/tcp... [2019-04-22/06-23]81pkt,1pt.(tcp) |
2019-06-23 14:14:27 |
| 189.114.67.213 | attack | Automatic report - Web App Attack |
2019-06-23 14:31:32 |
| 189.224.139.176 | attackbotsspam | 445/tcp [2019-06-22]1pkt |
2019-06-23 14:07:22 |
| 5.188.86.114 | attackbotsspam | Jun 23 07:15:25 h2177944 kernel: \[2610898.498810\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=38767 PROTO=TCP SPT=59154 DPT=3300 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 23 07:18:44 h2177944 kernel: \[2611097.157193\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=37782 PROTO=TCP SPT=59154 DPT=3357 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 23 07:43:47 h2177944 kernel: \[2612600.037931\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=252 PROTO=TCP SPT=59154 DPT=6005 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 23 07:46:22 h2177944 kernel: \[2612754.353933\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=53028 PROTO=TCP SPT=59154 DPT=3323 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 23 07:46:25 h2177944 kernel: \[2612757.824111\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=5.188.86.114 DST=85.214.117.9 LEN=40 |
2019-06-23 13:49:47 |