City: Stuttgart
Region: Baden-Württemberg Region
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: Universitaet Stuttgart
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.58.15.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54546
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.58.15.55. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019081300 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 14 02:56:59 CST 2019
;; MSG SIZE rcvd: 116
55.15.58.141.in-addr.arpa domain name pointer dyn-nec-55.hlrs.de.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
55.15.58.141.in-addr.arpa name = dyn-nec-55.hlrs.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
60.5.255.120 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 06:26:35 |
61.162.171.209 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 06:29:46 |
104.236.25.157 | attackspam | Jul 1 09:52:35 xtremcommunity sshd\[32168\]: Invalid user shui from 104.236.25.157 port 46564 Jul 1 09:52:35 xtremcommunity sshd\[32168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.25.157 Jul 1 09:52:37 xtremcommunity sshd\[32168\]: Failed password for invalid user shui from 104.236.25.157 port 46564 ssh2 Jul 1 09:54:59 xtremcommunity sshd\[32180\]: Invalid user anonymous from 104.236.25.157 port 35112 Jul 1 09:54:59 xtremcommunity sshd\[32180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.25.157 ... |
2019-07-02 06:48:41 |
118.243.117.67 | attackbotsspam | Jul 1 15:28:36 mail sshd\[20523\]: Invalid user minecraft from 118.243.117.67 Jul 1 15:28:36 mail sshd\[20523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.243.117.67 Jul 1 15:28:38 mail sshd\[20523\]: Failed password for invalid user minecraft from 118.243.117.67 port 36910 ssh2 ... |
2019-07-02 06:32:03 |
60.19.13.237 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 06:16:20 |
62.117.92.100 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 06:49:31 |
148.70.57.180 | attack | ECShop Remote Code Execution Vulnerability |
2019-07-02 06:11:10 |
124.41.211.27 | attackbotsspam | 2019-06-29 14:21:20 server sshd[77362]: Failed password for invalid user xin from 124.41.211.27 port 50578 ssh2 |
2019-07-02 06:15:27 |
197.51.85.241 | attack | Jul 1 16:28:11 srv-4 sshd\[25822\]: Invalid user admin from 197.51.85.241 Jul 1 16:28:11 srv-4 sshd\[25822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.51.85.241 Jul 1 16:28:12 srv-4 sshd\[25822\]: Failed password for invalid user admin from 197.51.85.241 port 50390 ssh2 ... |
2019-07-02 06:42:22 |
41.196.0.189 | attackbotsspam | Jul 1 21:44:08 Ubuntu-1404-trusty-64-minimal sshd\[7459\]: Invalid user marry from 41.196.0.189 Jul 1 21:44:08 Ubuntu-1404-trusty-64-minimal sshd\[7459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.196.0.189 Jul 1 21:44:11 Ubuntu-1404-trusty-64-minimal sshd\[7459\]: Failed password for invalid user marry from 41.196.0.189 port 46158 ssh2 Jul 1 21:53:44 Ubuntu-1404-trusty-64-minimal sshd\[14652\]: Invalid user lin from 41.196.0.189 Jul 1 21:53:44 Ubuntu-1404-trusty-64-minimal sshd\[14652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.196.0.189 |
2019-07-02 06:33:34 |
60.191.52.254 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2019-07-02 06:18:29 |
62.240.112.70 | attackspam | Honeypot attack, port: 445, PTR: mail.lebano-swisse-takaful.com. |
2019-07-02 06:35:23 |
196.250.176.130 | attackspambots | Trying to deliver email spam, but blocked by RBL |
2019-07-02 06:14:48 |
180.111.72.42 | attackbots | Jul 1 16:01:30 mail sshd[28570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.111.72.42 user=root Jul 1 16:01:32 mail sshd[28570]: Failed password for root from 180.111.72.42 port 37584 ssh2 Jul 1 16:01:35 mail sshd[28570]: Failed password for root from 180.111.72.42 port 37584 ssh2 Jul 1 16:01:30 mail sshd[28570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.111.72.42 user=root Jul 1 16:01:32 mail sshd[28570]: Failed password for root from 180.111.72.42 port 37584 ssh2 Jul 1 16:01:35 mail sshd[28570]: Failed password for root from 180.111.72.42 port 37584 ssh2 Jul 1 16:01:30 mail sshd[28570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.111.72.42 user=root Jul 1 16:01:32 mail sshd[28570]: Failed password for root from 180.111.72.42 port 37584 ssh2 Jul 1 16:01:35 mail sshd[28570]: Failed password for root from 180.111.72.42 port 37584 ssh2 Jul 1 16:01:38 mai |
2019-07-02 06:39:01 |
66.159.80.90 | attackspambots | C1,WP GET /humor/news/wp-includes/wlwmanifest.xml |
2019-07-02 06:28:13 |