City: Rosenheim
Region: Bayern
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.214.121.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;185.214.121.231. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121902 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 06:52:37 CST 2025
;; MSG SIZE rcvd: 108
Host 231.121.214.185.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 231.121.214.185.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 68.183.102.174 | attackspambots | Jul 15 02:45:55 mail sshd\[26887\]: Failed password for invalid user admin from 68.183.102.174 port 44774 ssh2 Jul 15 03:04:37 mail sshd\[27237\]: Invalid user nagios from 68.183.102.174 port 41476 Jul 15 03:04:37 mail sshd\[27237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.102.174 ... |
2019-07-15 10:19:21 |
| 107.170.192.46 | attackbots | Port scan attempt detected by AWS-CCS, CTS, India |
2019-07-15 10:28:49 |
| 156.194.171.155 | attackbotsspam | Jul 14 23:01:34 econome sshd[4645]: reveeclipse mapping checking getaddrinfo for host-156.194.155.171-static.tedata.net [156.194.171.155] failed - POSSIBLE BREAK-IN ATTEMPT! Jul 14 23:01:34 econome sshd[4645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.194.171.155 user=r.r Jul 14 23:01:36 econome sshd[4645]: Failed password for r.r from 156.194.171.155 port 46756 ssh2 Jul 14 23:01:38 econome sshd[4645]: Failed password for r.r from 156.194.171.155 port 46756 ssh2 Jul 14 23:01:41 econome sshd[4645]: Failed password for r.r from 156.194.171.155 port 46756 ssh2 Jul 14 23:01:43 econome sshd[4645]: Failed password for r.r from 156.194.171.155 port 46756 ssh2 Jul 14 23:01:46 econome sshd[4645]: Failed password for r.r from 156.194.171.155 port 46756 ssh2 Jul 14 23:01:48 econome sshd[4645]: Failed password for r.r from 156.194.171.155 port 46756 ssh2 Jul 14 23:01:48 econome sshd[4645]: Disconnecting: Too many authentication fai........ ------------------------------- |
2019-07-15 10:28:13 |
| 130.61.88.60 | attackbots | Many RDP login attempts detected by IDS script |
2019-07-15 10:11:36 |
| 138.68.146.186 | attack | vps1:pam-generic |
2019-07-15 10:25:06 |
| 131.100.219.3 | attackbotsspam | Jul 15 04:18:18 bouncer sshd\[31881\]: Invalid user rui from 131.100.219.3 port 58294 Jul 15 04:18:18 bouncer sshd\[31881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.100.219.3 Jul 15 04:18:21 bouncer sshd\[31881\]: Failed password for invalid user rui from 131.100.219.3 port 58294 ssh2 ... |
2019-07-15 10:22:00 |
| 134.175.120.173 | attackbotsspam | Jul 15 02:43:26 mail sshd\[26866\]: Failed password for invalid user lee from 134.175.120.173 port 34806 ssh2 Jul 15 03:00:58 mail sshd\[27141\]: Invalid user ka from 134.175.120.173 port 56196 ... |
2019-07-15 10:18:01 |
| 80.244.184.168 | attackbots | Automatic report - Banned IP Access |
2019-07-15 11:00:52 |
| 198.108.66.181 | attack | 81/tcp 9090/tcp 6443/tcp... [2019-05-24/07-14]11pkt,7pt.(tcp),1pt.(udp) |
2019-07-15 10:31:48 |
| 1.71.129.210 | attack | Jul 15 04:47:20 meumeu sshd[2869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.210 Jul 15 04:47:22 meumeu sshd[2869]: Failed password for invalid user karen from 1.71.129.210 port 43703 ssh2 Jul 15 04:52:51 meumeu sshd[4329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.210 ... |
2019-07-15 11:02:01 |
| 50.68.254.40 | attackspambots | Jul 12 17:31:40 Aberdeen-m4-Access auth.info sshd[30897]: Invalid user venom from 50.68.254.40 port 59327 Jul 12 17:31:40 Aberdeen-m4-Access auth.info sshd[30897]: Failed password for invalid user venom from 50.68.254.40 port 59327 ssh2 Jul 12 17:31:40 Aberdeen-m4-Access auth.info sshd[30897]: Received disconnect from 50.68.254.40 port 59327:11: Bye Bye [preauth] Jul 12 17:31:40 Aberdeen-m4-Access auth.info sshd[30897]: Disconnected from 50.68.254.40 port 59327 [preauth] Jul 12 17:31:40 Aberdeen-m4-Access auth.notice sshguard[11492]: Attack from "50.68.254.40" on service 100 whostnameh danger 10. Jul 12 17:31:40 Aberdeen-m4-Access auth.notice sshguard[11492]: Attack from "50.68.254.40" on service 100 whostnameh danger 10. Jul 12 17:31:40 Aberdeen-m4-Access auth.notice sshguard[11492]: Attack from "50.68.254.40" on service 100 whostnameh danger 10. Jul 12 17:31:40 Aberdeen-m4-Access auth.warn sshguard[11492]: Blocking "50.68.254.40/32" forever (3 attacks in 0 secs, after ........ ------------------------------ |
2019-07-15 10:45:30 |
| 59.167.62.188 | attackbotsspam | 2019-07-14T04:23:11.681086dokuwiki sshd\[17577\]: Invalid user tracey from 59.167.62.188 port 43050 2019-07-14T16:38:16.023622dokuwiki sshd\[19237\]: Invalid user polycom from 59.167.62.188 port 52188 2019-07-15T02:11:07.790389dokuwiki sshd\[20665\]: Invalid user oracle from 59.167.62.188 port 51314 |
2019-07-15 10:33:38 |
| 120.52.152.18 | attack | firewall-block, port(s): 705/tcp, 2082/tcp, 3306/tcp, 3388/tcp, 8087/tcp, 16993/tcp, 20000/tcp, 20574/tcp, 27015/tcp |
2019-07-15 10:21:05 |
| 78.131.52.74 | attackbots | " " |
2019-07-15 10:57:46 |
| 118.170.225.181 | attack | Unauthorised access (Jul 15) SRC=118.170.225.181 LEN=40 PREC=0x20 TTL=51 ID=51192 TCP DPT=23 WINDOW=32522 SYN |
2019-07-15 10:30:29 |