City: Obermiethnach
Region: Bayern
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.175.148.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22477
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.175.148.211. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:35:25 CST 2025
;; MSG SIZE rcvd: 106
Host 211.148.175.2.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 211.148.175.2.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 123.206.178.65 | attack | Aug 4 08:25:36 yabzik sshd[10505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.178.65 Aug 4 08:25:38 yabzik sshd[10505]: Failed password for invalid user elliott from 123.206.178.65 port 54457 ssh2 Aug 4 08:30:55 yabzik sshd[12131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.178.65 |
2019-08-04 13:42:39 |
| 222.84.157.178 | attackspam | Aug 4 06:28:48 microserver sshd[64234]: Invalid user t from 222.84.157.178 port 33820 Aug 4 06:28:48 microserver sshd[64234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.84.157.178 Aug 4 06:28:50 microserver sshd[64234]: Failed password for invalid user t from 222.84.157.178 port 33820 ssh2 Aug 4 06:33:25 microserver sshd[64891]: Invalid user user from 222.84.157.178 port 42732 Aug 4 06:33:25 microserver sshd[64891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.84.157.178 Aug 4 06:47:08 microserver sshd[1718]: Invalid user user from 222.84.157.178 port 41210 Aug 4 06:47:08 microserver sshd[1718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.84.157.178 Aug 4 06:47:10 microserver sshd[1718]: Failed password for invalid user user from 222.84.157.178 port 41210 ssh2 Aug 4 06:51:48 microserver sshd[2451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e |
2019-08-04 13:39:17 |
| 203.128.242.166 | attack | Aug 4 07:16:53 v22019058497090703 sshd[6191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166 Aug 4 07:16:55 v22019058497090703 sshd[6191]: Failed password for invalid user network1 from 203.128.242.166 port 54609 ssh2 Aug 4 07:22:13 v22019058497090703 sshd[6499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166 ... |
2019-08-04 13:22:22 |
| 164.52.24.173 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2019-08-04 13:27:35 |
| 220.141.112.90 | attackspam | Aug 4 10:14:05 our-server-hostname postfix/smtpd[21813]: connect from unknown[220.141.112.90] Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x Aug x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=220.141.112.90 |
2019-08-04 12:56:04 |
| 125.139.8.26 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-08-04 13:17:40 |
| 87.17.91.178 | attack | Honeypot attack, port: 23, PTR: host178-91-dynamic.17-87-r.retail.telecomitalia.it. |
2019-08-04 13:16:05 |
| 187.120.139.157 | attack | $f2bV_matches |
2019-08-04 13:06:24 |
| 101.187.63.113 | attackspam | Aug 4 05:24:58 localhost sshd\[35234\]: Invalid user diamond123 from 101.187.63.113 port 52386 Aug 4 05:24:58 localhost sshd\[35234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.187.63.113 Aug 4 05:25:00 localhost sshd\[35234\]: Failed password for invalid user diamond123 from 101.187.63.113 port 52386 ssh2 Aug 4 05:37:08 localhost sshd\[35582\]: Invalid user kenny from 101.187.63.113 port 50969 Aug 4 05:37:08 localhost sshd\[35582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.187.63.113 ... |
2019-08-04 13:48:36 |
| 142.11.240.29 | attack | DATE:2019-08-04 02:47:47, IP:142.11.240.29, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-08-04 13:26:08 |
| 218.92.0.160 | attackspambots | Aug 4 06:50:20 dcd-gentoo sshd[13666]: User root from 218.92.0.160 not allowed because none of user's groups are listed in AllowGroups Aug 4 06:50:23 dcd-gentoo sshd[13666]: error: PAM: Authentication failure for illegal user root from 218.92.0.160 Aug 4 06:50:20 dcd-gentoo sshd[13666]: User root from 218.92.0.160 not allowed because none of user's groups are listed in AllowGroups Aug 4 06:50:23 dcd-gentoo sshd[13666]: error: PAM: Authentication failure for illegal user root from 218.92.0.160 Aug 4 06:50:20 dcd-gentoo sshd[13666]: User root from 218.92.0.160 not allowed because none of user's groups are listed in AllowGroups Aug 4 06:50:23 dcd-gentoo sshd[13666]: error: PAM: Authentication failure for illegal user root from 218.92.0.160 Aug 4 06:50:23 dcd-gentoo sshd[13666]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.160 port 59706 ssh2 ... |
2019-08-04 13:18:10 |
| 134.209.237.152 | attack | Aug 4 07:09:58 OPSO sshd\[27300\]: Invalid user forscher from 134.209.237.152 port 56152 Aug 4 07:09:58 OPSO sshd\[27300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.152 Aug 4 07:10:01 OPSO sshd\[27300\]: Failed password for invalid user forscher from 134.209.237.152 port 56152 ssh2 Aug 4 07:14:04 OPSO sshd\[28175\]: Invalid user schumacher from 134.209.237.152 port 51600 Aug 4 07:14:04 OPSO sshd\[28175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.152 |
2019-08-04 13:43:37 |
| 156.218.47.196 | attack | [Aegis] @ 2019-08-04 05:02:19 0100 -> SSH insecure connection attempt (scan). |
2019-08-04 13:08:47 |
| 202.169.46.82 | attackspambots | Aug 4 00:52:07 plusreed sshd[7533]: Invalid user del from 202.169.46.82 ... |
2019-08-04 12:56:45 |
| 31.163.136.192 | attack | Aug 3 08:46:27 localhost kernel: [16080580.999049] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=31.163.136.192 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=53 ID=42880 PROTO=TCP SPT=11272 DPT=37215 WINDOW=288 RES=0x00 SYN URGP=0 Aug 3 08:46:27 localhost kernel: [16080580.999075] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=31.163.136.192 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=53 ID=42880 PROTO=TCP SPT=11272 DPT=37215 SEQ=758669438 ACK=0 WINDOW=288 RES=0x00 SYN URGP=0 Aug 3 22:36:02 localhost kernel: [16130355.518817] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=31.163.136.192 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=53 ID=4347 PROTO=TCP SPT=11272 DPT=37215 WINDOW=288 RES=0x00 SYN URGP=0 Aug 3 22:36:02 localhost kernel: [16130355.518844] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=31.163.136.192 DST=[mungedIP2] LEN=40 TOS=0x00 P |
2019-08-04 13:12:29 |