City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.55.214.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;162.55.214.56. IN A
;; AUTHORITY SECTION:
. 19 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:16:17 CST 2022
;; MSG SIZE rcvd: 106
56.214.55.162.in-addr.arpa domain name pointer static.56.214.55.162.clients.your-server.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
56.214.55.162.in-addr.arpa name = static.56.214.55.162.clients.your-server.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
51.75.202.218 | attack | Invalid user helena from 51.75.202.218 port 38100 |
2019-09-01 06:06:23 |
181.191.44.250 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-31 20:45:34,434 INFO [amun_request_handler] PortScan Detected on Port: 445 (181.191.44.250) |
2019-09-01 06:17:04 |
59.167.178.41 | attackspambots | Aug 31 21:54:14 game-panel sshd[27484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.167.178.41 Aug 31 21:54:16 game-panel sshd[27484]: Failed password for invalid user rc from 59.167.178.41 port 39002 ssh2 Aug 31 21:59:20 game-panel sshd[27665]: Failed password for root from 59.167.178.41 port 53832 ssh2 |
2019-09-01 06:02:10 |
106.13.28.62 | attack | Aug 31 12:07:19 kapalua sshd\[15859\]: Invalid user daniel from 106.13.28.62 Aug 31 12:07:19 kapalua sshd\[15859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.28.62 Aug 31 12:07:22 kapalua sshd\[15859\]: Failed password for invalid user daniel from 106.13.28.62 port 36554 ssh2 Aug 31 12:12:11 kapalua sshd\[16415\]: Invalid user pfdracin from 106.13.28.62 Aug 31 12:12:11 kapalua sshd\[16415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.28.62 |
2019-09-01 06:30:26 |
106.12.93.25 | attackspam | Invalid user zanni from 106.12.93.25 port 39254 |
2019-09-01 06:15:59 |
45.55.224.209 | attack | Aug 31 12:05:01 auw2 sshd\[31517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209 user=root Aug 31 12:05:03 auw2 sshd\[31517\]: Failed password for root from 45.55.224.209 port 35440 ssh2 Aug 31 12:09:52 auw2 sshd\[32072\]: Invalid user yamamoto from 45.55.224.209 Aug 31 12:09:52 auw2 sshd\[32072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209 Aug 31 12:09:54 auw2 sshd\[32072\]: Failed password for invalid user yamamoto from 45.55.224.209 port 57788 ssh2 |
2019-09-01 06:23:45 |
14.162.54.225 | attackbotsspam | Unauthorized connection attempt from IP address 14.162.54.225 on Port 445(SMB) |
2019-09-01 05:50:50 |
77.120.113.64 | attackbotsspam | Aug 31 23:53:37 mout sshd[23074]: Failed password for root from 77.120.113.64 port 35240 ssh2 Aug 31 23:53:39 mout sshd[23074]: Failed password for root from 77.120.113.64 port 35240 ssh2 Aug 31 23:53:42 mout sshd[23074]: Failed password for root from 77.120.113.64 port 35240 ssh2 |
2019-09-01 06:08:44 |
174.138.6.123 | attackbotsspam | Invalid user teacher1 from 174.138.6.123 port 50934 |
2019-09-01 06:05:38 |
139.59.180.53 | attackbotsspam | Aug 31 23:49:02 minden010 sshd[21272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.180.53 Aug 31 23:49:03 minden010 sshd[21272]: Failed password for invalid user test from 139.59.180.53 port 60274 ssh2 Aug 31 23:53:58 minden010 sshd[22927]: Failed password for root from 139.59.180.53 port 47356 ssh2 ... |
2019-09-01 05:59:48 |
141.98.9.130 | attack | Aug 31 23:46:12 mail postfix/smtpd\[15824\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Aug 31 23:46:57 mail postfix/smtpd\[15616\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 1 00:17:40 mail postfix/smtpd\[16722\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 1 00:18:26 mail postfix/smtpd\[16781\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-09-01 06:29:53 |
124.6.153.2 | attackbots | Aug 31 12:07:40 kapalua sshd\[15908\]: Invalid user sinusbot1 from 124.6.153.2 Aug 31 12:07:40 kapalua sshd\[15908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.6.153.2 Aug 31 12:07:42 kapalua sshd\[15908\]: Failed password for invalid user sinusbot1 from 124.6.153.2 port 42060 ssh2 Aug 31 12:12:28 kapalua sshd\[16455\]: Invalid user vncuser from 124.6.153.2 Aug 31 12:12:28 kapalua sshd\[16455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.6.153.2 |
2019-09-01 06:16:37 |
193.147.107.45 | attackspam | 2019-08-31T08:12:57.100844ldap.arvenenaske.de sshd[31081]: Connection from 193.147.107.45 port 38670 on 5.199.128.55 port 22 2019-08-31T08:12:57.437084ldap.arvenenaske.de sshd[31081]: Invalid user teamspeak from 193.147.107.45 port 38670 2019-08-31T08:12:57.441383ldap.arvenenaske.de sshd[31081]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.147.107.45 user=teamspeak 2019-08-31T08:12:57.442469ldap.arvenenaske.de sshd[31081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.147.107.45 2019-08-31T08:12:57.100844ldap.arvenenaske.de sshd[31081]: Connection from 193.147.107.45 port 38670 on 5.199.128.55 port 22 2019-08-31T08:12:57.437084ldap.arvenenaske.de sshd[31081]: Invalid user teamspeak from 193.147.107.45 port 38670 2019-08-31T08:12:59.254770ldap.arvenenaske.de sshd[31081]: Failed password for invalid user teamspeak from 193.147.107.45 port 38670 ssh2 2019-08-31T08:21:38.332847ldap.ar........ ------------------------------ |
2019-09-01 06:13:38 |
40.112.248.127 | attack | Invalid user dh from 40.112.248.127 port 8256 |
2019-09-01 05:52:01 |
93.42.117.137 | attackspam | Automatic report - Banned IP Access |
2019-09-01 06:23:29 |