City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.16.134.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;31.16.134.129. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 01:03:59 CST 2025
;; MSG SIZE rcvd: 106
129.134.16.31.in-addr.arpa domain name pointer ip1f108681.dynamic.kabel-deutschland.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
129.134.16.31.in-addr.arpa name = ip1f108681.dynamic.kabel-deutschland.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
128.65.152.67 | attack | Automatic report - Port Scan Attack |
2019-08-16 06:15:22 |
103.245.195.33 | attack | 19/8/15@16:19:59: FAIL: Alarm-Intrusion address from=103.245.195.33 19/8/15@16:19:59: FAIL: Alarm-Intrusion address from=103.245.195.33 ... |
2019-08-16 06:04:16 |
201.211.153.58 | attackspam | 445/tcp [2019-08-15]1pkt |
2019-08-16 06:41:17 |
164.132.98.35 | attack | Aug 15 17:46:57 xtremcommunity sshd\[7153\]: Invalid user vagrant from 164.132.98.35 port 58256 Aug 15 17:46:57 xtremcommunity sshd\[7153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.35 Aug 15 17:47:00 xtremcommunity sshd\[7153\]: Failed password for invalid user vagrant from 164.132.98.35 port 58256 ssh2 Aug 15 17:47:30 xtremcommunity sshd\[7176\]: Invalid user vagrant from 164.132.98.35 port 43972 Aug 15 17:47:30 xtremcommunity sshd\[7176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.35 ... |
2019-08-16 05:59:24 |
106.13.78.56 | attackspambots | Aug 16 01:29:48 www sshd\[241640\]: Invalid user tiago from 106.13.78.56 Aug 16 01:29:48 www sshd\[241640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.56 Aug 16 01:29:50 www sshd\[241640\]: Failed password for invalid user tiago from 106.13.78.56 port 39582 ssh2 ... |
2019-08-16 06:38:31 |
203.129.207.2 | attackspam | Invalid user student09 from 203.129.207.2 port 51912 |
2019-08-16 06:10:17 |
139.215.217.181 | attack | Aug 15 18:10:17 xtremcommunity sshd\[8312\]: Invalid user 123 from 139.215.217.181 port 47911 Aug 15 18:10:17 xtremcommunity sshd\[8312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181 Aug 15 18:10:19 xtremcommunity sshd\[8312\]: Failed password for invalid user 123 from 139.215.217.181 port 47911 ssh2 Aug 15 18:13:56 xtremcommunity sshd\[8466\]: Invalid user 123456 from 139.215.217.181 port 35307 Aug 15 18:13:56 xtremcommunity sshd\[8466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181 ... |
2019-08-16 06:18:53 |
23.129.64.215 | attackspambots | Automated report - ssh fail2ban: Aug 15 23:59:30 wrong password, user=root, port=27255, ssh2 Aug 15 23:59:34 wrong password, user=root, port=27255, ssh2 Aug 15 23:59:37 wrong password, user=root, port=27255, ssh2 |
2019-08-16 06:13:14 |
103.30.1.27 | attackspambots | Invalid user production from 103.30.1.27 port 54718 |
2019-08-16 06:07:17 |
60.17.138.72 | attack | 8080/tcp [2019-08-15]1pkt |
2019-08-16 06:22:23 |
190.98.242.100 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-15 20:11:54,482 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.98.242.100) |
2019-08-16 06:11:44 |
189.6.45.130 | attackbots | Aug 15 20:10:32 raspberrypi sshd\[22742\]: Invalid user mnm from 189.6.45.130Aug 15 20:10:34 raspberrypi sshd\[22742\]: Failed password for invalid user mnm from 189.6.45.130 port 41529 ssh2Aug 15 20:19:28 raspberrypi sshd\[22963\]: Invalid user hash from 189.6.45.130 ... |
2019-08-16 06:28:49 |
88.218.16.164 | attackspambots | [Aegis] @ 2019-08-15 21:19:23 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-08-16 06:21:55 |
112.85.42.172 | attackspam | $f2bV_matches |
2019-08-16 06:09:12 |
74.63.242.198 | attackbots | *Port Scan* detected from 74.63.242.198 (US/United States/198-242-63-74.static.reverse.lstn.net). 4 hits in the last 126 seconds |
2019-08-16 06:38:56 |