City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.89.68.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.89.68.50. IN A
;; AUTHORITY SECTION:
. 262 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:17:55 CST 2022
;; MSG SIZE rcvd: 105
50.68.89.141.in-addr.arpa domain name pointer lb-www.rz.uni-potsdam.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
50.68.89.141.in-addr.arpa name = lb-www.rz.uni-potsdam.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.88.167.48 | attackbotsspam | Unauthorised access (Dec 4) SRC=113.88.167.48 LEN=52 TTL=50 ID=13844 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-05 08:49:20 |
| 134.209.64.10 | attack | Dec 4 19:18:02 124388 sshd[31204]: Invalid user elieser from 134.209.64.10 port 53902 Dec 4 19:18:02 124388 sshd[31204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10 Dec 4 19:18:02 124388 sshd[31204]: Invalid user elieser from 134.209.64.10 port 53902 Dec 4 19:18:04 124388 sshd[31204]: Failed password for invalid user elieser from 134.209.64.10 port 53902 ssh2 Dec 4 19:23:00 124388 sshd[31281]: Invalid user rumold from 134.209.64.10 port 35578 |
2019-12-05 08:30:04 |
| 46.232.251.199 | attackbotsspam | Invalid user fryman from 46.232.251.199 port 34572 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.232.251.199 Failed password for invalid user fryman from 46.232.251.199 port 34572 ssh2 Invalid user gahrsen from 46.232.251.199 port 60144 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.232.251.199 |
2019-12-05 13:08:28 |
| 189.7.17.61 | attackbots | detected by Fail2Ban |
2019-12-05 08:45:00 |
| 146.0.209.72 | attackspam | Dec 4 13:33:15 kapalua sshd\[6149\]: Invalid user eugen from 146.0.209.72 Dec 4 13:33:15 kapalua sshd\[6149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72-209-0-146.static.cpe.unicatlc.net Dec 4 13:33:16 kapalua sshd\[6149\]: Failed password for invalid user eugen from 146.0.209.72 port 50632 ssh2 Dec 4 13:40:32 kapalua sshd\[7016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72-209-0-146.static.cpe.unicatlc.net user=root Dec 4 13:40:34 kapalua sshd\[7016\]: Failed password for root from 146.0.209.72 port 33116 ssh2 |
2019-12-05 08:32:38 |
| 79.125.183.32 | attack | " " |
2019-12-05 08:35:59 |
| 201.49.110.210 | attackbotsspam | Dec 5 01:19:59 markkoudstaal sshd[488]: Failed password for root from 201.49.110.210 port 38200 ssh2 Dec 5 01:26:29 markkoudstaal sshd[1216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.110.210 Dec 5 01:26:31 markkoudstaal sshd[1216]: Failed password for invalid user erling from 201.49.110.210 port 55986 ssh2 |
2019-12-05 08:28:22 |
| 198.143.133.154 | attackspam | Honeypot attack, port: 23, PTR: sh-phx-us-gp1-wk103.internet-census.org. |
2019-12-05 08:54:47 |
| 188.136.206.76 | attack | " " |
2019-12-05 08:24:35 |
| 41.93.32.88 | attackbotsspam | Dec 5 00:30:42 Ubuntu-1404-trusty-64-minimal sshd\[28025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.88 user=root Dec 5 00:30:45 Ubuntu-1404-trusty-64-minimal sshd\[28025\]: Failed password for root from 41.93.32.88 port 36032 ssh2 Dec 5 00:38:40 Ubuntu-1404-trusty-64-minimal sshd\[31645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.88 user=root Dec 5 00:38:42 Ubuntu-1404-trusty-64-minimal sshd\[31645\]: Failed password for root from 41.93.32.88 port 51996 ssh2 Dec 5 00:46:14 Ubuntu-1404-trusty-64-minimal sshd\[8016\]: Invalid user atmosphere from 41.93.32.88 Dec 5 00:46:14 Ubuntu-1404-trusty-64-minimal sshd\[8016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.93.32.88 |
2019-12-05 08:52:16 |
| 35.185.239.108 | attack | Dec 5 09:57:36 gw1 sshd[25613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.239.108 Dec 5 09:57:39 gw1 sshd[25613]: Failed password for invalid user ieb from 35.185.239.108 port 38016 ssh2 ... |
2019-12-05 13:05:16 |
| 106.13.56.72 | attackspam | Dec 4 23:50:01 srv206 sshd[25355]: Invalid user vps2015 from 106.13.56.72 ... |
2019-12-05 08:45:40 |
| 106.66.142.38 | attackspambots | PHI,WP GET /wp-login.php |
2019-12-05 08:51:20 |
| 106.13.10.159 | attackbotsspam | Dec 4 22:39:13 localhost sshd\[14221\]: Invalid user guest from 106.13.10.159 port 42116 Dec 4 22:39:13 localhost sshd\[14221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.10.159 Dec 4 22:39:15 localhost sshd\[14221\]: Failed password for invalid user guest from 106.13.10.159 port 42116 ssh2 |
2019-12-05 08:48:32 |
| 80.249.80.6 | attack | Bad bot requested remote resources |
2019-12-05 13:04:41 |