City: Nürnberg
Region: Bayern
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.56.99.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26935
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.56.99.62. IN A
;; AUTHORITY SECTION:
. 204 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024040402 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 05 10:56:00 CST 2024
;; MSG SIZE rcvd: 103
62.99.56.2.in-addr.arpa domain name pointer cloud.till-eulenspiegel-schule-berlin.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
62.99.56.2.in-addr.arpa name = cloud.till-eulenspiegel-schule-berlin.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.249.232.190 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 11:36:57,159 INFO [amun_request_handler] PortScan Detected on Port: 445 (49.249.232.190) |
2019-09-22 03:05:13 |
| 5.196.217.179 | attack | Sep 21 19:07:53 postfix/smtpd: warning: unknown[5.196.217.179]: SASL LOGIN authentication failed |
2019-09-22 03:24:35 |
| 203.195.204.142 | attackspambots | Sep 21 14:47:25 TORMINT sshd\[31185\]: Invalid user alex from 203.195.204.142 Sep 21 14:47:25 TORMINT sshd\[31185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.204.142 Sep 21 14:47:26 TORMINT sshd\[31185\]: Failed password for invalid user alex from 203.195.204.142 port 52034 ssh2 ... |
2019-09-22 02:59:26 |
| 201.149.22.37 | attackspambots | Sep 21 08:41:35 eddieflores sshd\[3886\]: Invalid user lr from 201.149.22.37 Sep 21 08:41:35 eddieflores sshd\[3886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.22.37 Sep 21 08:41:37 eddieflores sshd\[3886\]: Failed password for invalid user lr from 201.149.22.37 port 48372 ssh2 Sep 21 08:45:28 eddieflores sshd\[4245\]: Invalid user tty from 201.149.22.37 Sep 21 08:45:28 eddieflores sshd\[4245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.22.37 |
2019-09-22 02:50:45 |
| 125.17.108.50 | attackbots | 3389BruteforceFW21 |
2019-09-22 03:10:14 |
| 112.85.42.175 | attackbots | Sep 21 19:08:44 sshgateway sshd\[30423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.175 user=root Sep 21 19:08:46 sshgateway sshd\[30423\]: Failed password for root from 112.85.42.175 port 12486 ssh2 Sep 21 19:08:51 sshgateway sshd\[30423\]: Failed password for root from 112.85.42.175 port 12486 ssh2 |
2019-09-22 03:21:23 |
| 45.4.148.14 | attackspam | Invalid user pd from 45.4.148.14 port 36985 |
2019-09-22 03:17:10 |
| 121.136.167.50 | attack | Sep 21 16:25:54 XXX sshd[61893]: Invalid user ofsaa from 121.136.167.50 port 45546 |
2019-09-22 03:09:28 |
| 54.36.149.64 | attack | Automatic report - Banned IP Access |
2019-09-22 03:03:20 |
| 78.182.215.206 | attack | [Sat Sep 21 09:52:13.168223 2019] [:error] [pid 14982] [client 78.182.215.206:40817] [client 78.182.215.206] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "91"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 21)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "127.0.0.1"] [uri "/cgi-bin/ViewLog.asp"] [unique_id "XYYc-Tw5BZQTcJcplDvBZAAAAAE"] ... |
2019-09-22 03:01:21 |
| 111.253.88.248 | attack | Unauthorised access (Sep 21) SRC=111.253.88.248 LEN=40 PREC=0x20 TTL=52 ID=60100 TCP DPT=23 WINDOW=40514 SYN |
2019-09-22 02:50:13 |
| 218.92.0.212 | attack | Sep 21 17:27:45 marvibiene sshd[26150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212 user=root Sep 21 17:27:47 marvibiene sshd[26150]: Failed password for root from 218.92.0.212 port 17147 ssh2 Sep 21 17:27:50 marvibiene sshd[26150]: Failed password for root from 218.92.0.212 port 17147 ssh2 Sep 21 17:27:45 marvibiene sshd[26150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212 user=root Sep 21 17:27:47 marvibiene sshd[26150]: Failed password for root from 218.92.0.212 port 17147 ssh2 Sep 21 17:27:50 marvibiene sshd[26150]: Failed password for root from 218.92.0.212 port 17147 ssh2 ... |
2019-09-22 03:03:52 |
| 180.183.246.202 | attackbotsspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 11:31:25,886 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.183.246.202) |
2019-09-22 03:16:40 |
| 41.218.223.253 | attackbots | Chat Spam |
2019-09-22 03:13:14 |
| 184.105.247.222 | attack | 3389BruteforceFW21 |
2019-09-22 03:17:28 |