City: Nuremberg
Region: Bavaria
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
164.68.105.199 | attack | Bokeh |
2024-06-20 15:59:45 |
164.68.105.199 | attack | Xnxx |
2024-06-20 15:59:34 |
164.68.105.199 | attack | Xnxx |
2024-06-20 15:59:26 |
164.68.105.199 | attack | Xnxx |
2024-06-20 15:59:21 |
164.68.105.165 | attack | Found on Block CINS-badguys / proto=6 . srcport=41861 . dstport=5038 . (2483) |
2020-09-28 04:30:37 |
164.68.105.165 | attackbotsspam |
|
2020-09-27 20:47:35 |
164.68.105.165 | attackbotsspam |
|
2020-09-27 12:25:05 |
164.68.105.165 | attackspam | 5038/tcp 5038/tcp [2020-09-15/19]2pkt |
2020-09-20 02:59:21 |
164.68.105.165 | attack | " " |
2020-09-19 18:59:19 |
164.68.105.131 | attackspambots | Aug 16 15:57:39 srv-ubuntu-dev3 sshd[102030]: Invalid user gmodserver from 164.68.105.131 Aug 16 15:57:39 srv-ubuntu-dev3 sshd[102030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.105.131 Aug 16 15:57:39 srv-ubuntu-dev3 sshd[102030]: Invalid user gmodserver from 164.68.105.131 Aug 16 15:57:40 srv-ubuntu-dev3 sshd[102030]: Failed password for invalid user gmodserver from 164.68.105.131 port 55996 ssh2 Aug 16 16:01:29 srv-ubuntu-dev3 sshd[102595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.105.131 user=root Aug 16 16:01:31 srv-ubuntu-dev3 sshd[102595]: Failed password for root from 164.68.105.131 port 37242 ssh2 Aug 16 16:05:10 srv-ubuntu-dev3 sshd[103028]: Invalid user hannes from 164.68.105.131 Aug 16 16:05:10 srv-ubuntu-dev3 sshd[103028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.105.131 Aug 16 16:05:10 srv-ubuntu-dev3 sshd[103028 ... |
2020-08-16 22:14:43 |
164.68.105.228 | attack | Jun 3 12:06:38 nxxxxxxx0 sshd[8981]: Did not receive identification string from 164.68.105.228 Jun 3 12:07:38 nxxxxxxx0 sshd[9068]: Address 164.68.105.228 maps to melion.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jun 3 12:07:38 nxxxxxxx0 sshd[9068]: Invalid user soundcode from 164.68.105.228 Jun 3 12:07:38 nxxxxxxx0 sshd[9068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.105.228 Jun 3 12:07:40 nxxxxxxx0 sshd[9068]: Failed password for invalid user soundcode from 164.68.105.228 port 34484 ssh2 Jun 3 12:07:40 nxxxxxxx0 sshd[9068]: Received disconnect from 164.68.105.228: 11: Normal Shutdown, Thank you for playing [preauth] Jun 3 12:07:43 nxxxxxxx0 sshd[9072]: Address 164.68.105.228 maps to melion.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jun 3 12:07:43 nxxxxxxx0 sshd[9072]: Invalid user aerospike from 164.68.105.228 Jun 3 12:07:43 nxxxxxxx0 sshd[........ ------------------------------- |
2020-06-06 07:13:55 |
164.68.105.78 | attack | Mar 19 17:00:51 saengerschafter sshd[29883]: Failed password for jira from 164.68.105.78 port 37546 ssh2 Mar 19 17:00:51 saengerschafter sshd[29883]: Received disconnect from 164.68.105.78: 11: Bye Bye [preauth] Mar 19 17:06:22 saengerschafter sshd[30288]: Failed password for r.r from 164.68.105.78 port 40498 ssh2 Mar 19 17:06:22 saengerschafter sshd[30288]: Received disconnect from 164.68.105.78: 11: Bye Bye [preauth] Mar 19 17:09:26 saengerschafter sshd[30746]: Failed password for r.r from 164.68.105.78 port 47708 ssh2 Mar 19 17:09:26 saengerschafter sshd[30746]: Received disconnect from 164.68.105.78: 11: Bye Bye [preauth] Mar 19 17:12:35 saengerschafter sshd[30860]: Failed password for r.r from 164.68.105.78 port 54914 ssh2 Mar 19 17:12:35 saengerschafter sshd[30860]: Received disconnect from 164.68.105.78: 11: Bye Bye [preauth] Mar 19 17:15:38 saengerschafter sshd[31263]: Failed password for r.r from 164.68.105.78 port 33898 ssh2 Mar 19 17:15:38 saengerschafter ssh........ ------------------------------- |
2020-03-22 19:53:29 |
164.68.105.78 | attackspam | ... |
2020-03-21 20:00:24 |
164.68.105.70 | attackspambots | Port 22 Scan, PTR: None |
2019-12-29 03:22:00 |
164.68.105.103 | attackbots | Oct 6 20:51:31 new sshd[24599]: Failed password for r.r from 164.68.105.103 port 58796 ssh2 Oct 6 20:51:31 new sshd[24599]: Received disconnect from 164.68.105.103: 11: Bye Bye [preauth] Oct 6 20:56:35 new sshd[25903]: Failed password for r.r from 164.68.105.103 port 49432 ssh2 Oct 6 20:56:35 new sshd[25903]: Received disconnect from 164.68.105.103: 11: Bye Bye [preauth] Oct 6 21:01:04 new sshd[27198]: Failed password for r.r from 164.68.105.103 port 36792 ssh2 Oct 6 21:01:04 new sshd[27198]: Received disconnect from 164.68.105.103: 11: Bye Bye [preauth] Oct 6 21:05:29 new sshd[28328]: Failed password for r.r from 164.68.105.103 port 52780 ssh2 Oct 6 21:05:29 new sshd[28328]: Received disconnect from 164.68.105.103: 11: Bye Bye [preauth] Oct 6 21:09:49 new sshd[29739]: Failed password for r.r from 164.68.105.103 port 40212 ssh2 Oct 6 21:09:49 new sshd[29739]: Received disconnect from 164.68.105.103: 11: Bye Bye [preauth] Oct 6 21:14:09 new sshd[30482]: Failed........ ------------------------------- |
2019-10-08 16:49:21 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.68.105.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43936
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.68.105.138. IN A
;; AUTHORITY SECTION:
. 534 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2021112000 1800 900 604800 86400
;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 20 16:01:45 CST 2021
;; MSG SIZE rcvd: 107
138.105.68.164.in-addr.arpa domain name pointer monitoring.itz-cloud.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.105.68.164.in-addr.arpa name = monitoring.itz-cloud.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
174.138.27.165 | attackbots | k+ssh-bruteforce |
2020-09-10 03:56:56 |
154.0.171.171 | attackspambots | 154.0.171.171 - - [09/Sep/2020:18:58:11 +0200] "GET /wp-login.php HTTP/1.1" 200 2566 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 154.0.171.171 - - [09/Sep/2020:18:58:12 +0200] "POST /wp-login.php HTTP/1.1" 200 2698 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 154.0.171.171 - - [09/Sep/2020:18:58:12 +0200] "GET /wp-login.php HTTP/1.1" 200 2566 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 154.0.171.171 - - [09/Sep/2020:18:58:13 +0200] "POST /wp-login.php HTTP/1.1" 200 2672 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 154.0.171.171 - - [09/Sep/2020:18:58:13 +0200] "GET /wp-login.php HTTP/1.1" 200 2566 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 154.0.171.171 - - [09/Sep/2020:18:58:14 +0200] "POST /wp-login.php HTTP/1.1" 200 2673 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Fir ... |
2020-09-10 03:30:21 |
201.108.119.85 | attackspam | 1599670701 - 09/09/2020 18:58:21 Host: 201.108.119.85/201.108.119.85 Port: 445 TCP Blocked |
2020-09-10 03:26:14 |
188.159.42.198 | attack | 1599670676 - 09/09/2020 18:57:56 Host: 188.159.42.198/188.159.42.198 Port: 445 TCP Blocked |
2020-09-10 03:37:59 |
181.48.79.178 | attackspambots | Invalid user localhost from 181.48.79.178 port 35934 |
2020-09-10 03:40:45 |
222.186.30.35 | attack | 2020-09-09T21:25[Censored Hostname] sshd[17279]: Failed password for root from 222.186.30.35 port 31624 ssh2 2020-09-09T21:25[Censored Hostname] sshd[17279]: Failed password for root from 222.186.30.35 port 31624 ssh2 2020-09-09T21:25[Censored Hostname] sshd[17279]: Failed password for root from 222.186.30.35 port 31624 ssh2[...] |
2020-09-10 03:32:20 |
185.220.100.246 | attack | fell into ViewStateTrap:wien2018 |
2020-09-10 03:26:32 |
189.178.116.154 | attack | SSH |
2020-09-10 03:29:55 |
95.163.195.60 | attackbots | 95.163.195.60 (US/United States/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 9 12:49:21 jbs1 sshd[17354]: Failed password for root from 157.245.54.200 port 46116 ssh2 Sep 9 12:57:44 jbs1 sshd[20671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.197 user=root Sep 9 12:52:29 jbs1 sshd[18281]: Failed password for root from 49.235.215.147 port 36210 ssh2 Sep 9 12:49:19 jbs1 sshd[17354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.54.200 user=root Sep 9 12:52:27 jbs1 sshd[18269]: Failed password for root from 95.163.195.60 port 40440 ssh2 Sep 9 12:52:27 jbs1 sshd[18281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.215.147 user=root IP Addresses Blocked: 157.245.54.200 (SG/Singapore/-) 117.50.99.197 (CN/China/-) 49.235.215.147 (CN/China/-) |
2020-09-10 03:37:43 |
210.195.154.144 | attackspambots | Unauthorised access (Sep 9) SRC=210.195.154.144 LEN=44 TTL=52 ID=17667 TCP DPT=8080 WINDOW=53272 SYN |
2020-09-10 03:48:16 |
151.80.37.200 | attack | Sep 9 15:47:31 firewall sshd[30673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.37.200 Sep 9 15:47:31 firewall sshd[30673]: Invalid user y from 151.80.37.200 Sep 9 15:47:33 firewall sshd[30673]: Failed password for invalid user y from 151.80.37.200 port 45254 ssh2 ... |
2020-09-10 03:31:07 |
59.61.25.222 | attack | SpamScore above: 10.0 |
2020-09-10 03:58:50 |
83.103.206.60 | attack | Dovecot Invalid User Login Attempt. |
2020-09-10 03:38:59 |
51.178.81.106 | attackspam | WordPress wp-login brute force :: 51.178.81.106 0.388 BYPASS [09/Sep/2020:16:57:43 0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2578 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-09-10 03:46:22 |
122.51.179.24 | attack | 122.51.179.24 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 9 12:55:46 server4 sshd[8443]: Failed password for root from 128.199.224.34 port 59296 ssh2 Sep 9 12:58:10 server4 sshd[9677]: Failed password for root from 151.80.37.200 port 46842 ssh2 Sep 9 12:57:47 server4 sshd[9601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.178.116.154 user=root Sep 9 12:57:49 server4 sshd[9601]: Failed password for root from 189.178.116.154 port 60906 ssh2 Sep 9 12:57:32 server4 sshd[9475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.179.24 user=root Sep 9 12:57:34 server4 sshd[9475]: Failed password for root from 122.51.179.24 port 41144 ssh2 IP Addresses Blocked: 128.199.224.34 (SG/Singapore/-) 151.80.37.200 (FR/France/-) 189.178.116.154 (MX/Mexico/-) |
2020-09-10 03:29:16 |