City: Nürnberg
Region: Bayern
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2a03:4000:53:cb0:642b:2eff:fe41:ed09
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 6227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2a03:4000:53:cb0:642b:2eff:fe41:ed09. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Thu Apr 03 14:41:25 CST 2025
;; MSG SIZE rcvd: 65
'
b'Host 9.0.d.e.1.4.e.f.f.f.e.2.b.2.4.6.0.b.c.0.3.5.0.0.0.0.0.4.3.0.a.2.ip6.arpa not found: 3(NXDOMAIN)
'
server can't find 2a03:4000:53:cb0:642b:2eff:fe41:ed09.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 157.230.109.166 | attack | Nov 18 00:07:41 OPSO sshd\[13753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.109.166 user=root Nov 18 00:07:43 OPSO sshd\[13753\]: Failed password for root from 157.230.109.166 port 39088 ssh2 Nov 18 00:11:13 OPSO sshd\[14446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.109.166 user=root Nov 18 00:11:15 OPSO sshd\[14446\]: Failed password for root from 157.230.109.166 port 49188 ssh2 Nov 18 00:14:44 OPSO sshd\[14678\]: Invalid user sophos from 157.230.109.166 port 59294 Nov 18 00:14:44 OPSO sshd\[14678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.109.166 |
2019-11-18 07:45:28 |
| 104.248.42.94 | attack | Nov 17 23:21:47 icinga sshd[4842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.42.94 Nov 17 23:21:49 icinga sshd[4842]: Failed password for invalid user xbmc from 104.248.42.94 port 49854 ssh2 Nov 17 23:42:58 icinga sshd[24675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.42.94 ... |
2019-11-18 07:49:25 |
| 159.203.201.196 | attack | scan z |
2019-11-18 07:43:14 |
| 78.47.198.161 | attackspambots | 78.47.198.161 - - [17/Nov/2019:23:42:24 +0100] "GET /awstats.pl?lang=de&output=allrobots HTTP/1.1" 404 280 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6" |
2019-11-18 08:01:27 |
| 103.16.143.26 | attack | Unauthorized access to SSH at 17/Nov/2019:22:42:16 +0000. |
2019-11-18 08:03:55 |
| 68.183.122.146 | attackspam | fire |
2019-11-18 07:27:24 |
| 23.236.155.162 | attack | rugninja.com 23.236.155.162 USA 23.97.27.97 USA Return-path: |
2019-11-18 07:39:31 |
| 45.82.153.76 | attackspambots | Nov 17 18:06:52 web1 postfix/smtpd[5103]: warning: unknown[45.82.153.76]: SASL LOGIN authentication failed: authentication failure ... |
2019-11-18 07:38:36 |
| 117.2.100.124 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-18 07:54:12 |
| 183.57.22.228 | attackspam | Port 1433 Scan |
2019-11-18 07:48:20 |
| 61.184.247.8 | attackspambots | fire |
2019-11-18 07:34:29 |
| 62.65.78.89 | attack | fire |
2019-11-18 07:31:47 |
| 205.185.127.219 | attack | fell into ViewStateTrap:oslo |
2019-11-18 07:37:35 |
| 78.47.192.194 | attackspam | 78.47.192.194 - - [17/Nov/2019:23:42:27 +0100] "GET /awstats.pl?lang=fr&output=lastrobots HTTP/1.1" 404 280 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6" |
2019-11-18 07:59:28 |
| 180.183.54.148 | attackspambots | Nov 17 20:45:14 firewall sshd[4655]: Invalid user abc12345 from 180.183.54.148 Nov 17 20:45:16 firewall sshd[4655]: Failed password for invalid user abc12345 from 180.183.54.148 port 33062 ssh2 Nov 17 20:49:39 firewall sshd[4707]: Invalid user burstad from 180.183.54.148 ... |
2019-11-18 07:58:13 |