City: Nürnberg
Region: Bayern
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.45.99.16 | attackbots | Failed password for invalid user king from 5.45.99.16 port 36158 ssh2 |
2020-05-26 14:15:56 |
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '5.45.96.0 - 5.45.99.255'
% Abuse contact for '5.45.96.0 - 5.45.99.255' is 'abuse@netcup.de'
inetnum: 5.45.96.0 - 5.45.99.255
netname: NETCUP_NET-8
org: ORG-nG51-RIPE
descr: netcup GmbH
country: DE
admin-c: OW395-RIPE
tech-c: OW395-RIPE
status: ASSIGNED PA
remarks: INFRA-AW
mnt-by: NETCUP-MNT
created: 2013-09-25T08:50:03Z
last-modified: 2013-09-25T08:54:17Z
source: RIPE
organisation: ORG-nG51-RIPE
org-name: netcup GmbH
country: DE
org-type: LIR
address: Emmy-Noether-Strae-10
address: 76131
address: Karlsruhe
address: GERMANY
phone: +4972175407550
fax-no: +4972175407559
reg-nr: District court Mannheim HRB 705547
admin-c: OW395-RIPE
abuse-c: NA4042-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: NETCUP-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: NETCUP-MNT
created: 2010-11-03T10:05:19Z
last-modified: 2026-04-29T05:03:29Z
source: RIPE # Filtered
person: Oliver Werner
address: netcup GmbH
address: Daimlerstrasse 25
address: 76185 Karlsruhe
phone: +49721 75407550
nic-hdl: OW395-RIPE
mnt-by: NETCUP-MNT
created: 2010-11-03T14:34:38Z
last-modified: 2017-10-30T22:11:28Z
source: RIPE # Filtered
% Information related to '5.45.96.0/20AS197540'
route: 5.45.96.0/20
descr: NETCUP-GMBH
origin: AS197540
mnt-by: NETCUP-MNT
created: 2013-05-15T11:10:09Z
last-modified: 2013-05-15T11:10:09Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.122 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.45.99.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.45.99.158. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 18:30:58 CST 2026
;; MSG SIZE rcvd: 104
158.99.45.5.in-addr.arpa domain name pointer v2202507290064367794.goodsrv.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
158.99.45.5.in-addr.arpa name = v2202507290064367794.goodsrv.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 178.128.74.234 | attackspam | Invalid user jader from 178.128.74.234 port 60006 |
2019-08-03 08:22:09 |
| 54.36.108.162 | attackbots | 2019-08-02T21:39:37.881921mizuno.rwx.ovh sshd[19964]: Connection from 54.36.108.162 port 39365 on 78.46.61.178 port 22 2019-08-02T21:39:38.970333mizuno.rwx.ovh sshd[19964]: Invalid user NetLinx from 54.36.108.162 port 39365 2019-08-02T21:39:38.981408mizuno.rwx.ovh sshd[19964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.108.162 2019-08-02T21:39:37.881921mizuno.rwx.ovh sshd[19964]: Connection from 54.36.108.162 port 39365 on 78.46.61.178 port 22 2019-08-02T21:39:38.970333mizuno.rwx.ovh sshd[19964]: Invalid user NetLinx from 54.36.108.162 port 39365 2019-08-02T21:39:40.585981mizuno.rwx.ovh sshd[19964]: Failed password for invalid user NetLinx from 54.36.108.162 port 39365 ssh2 ... |
2019-08-03 08:45:23 |
| 128.199.219.121 | attack | SSH Bruteforce @ SigaVPN honeypot |
2019-08-03 08:28:37 |
| 177.158.84.124 | attackspambots | Automatic report - Port Scan Attack |
2019-08-03 08:33:43 |
| 45.79.1.161 | attack | Honeypot attack, port: 135, PTR: min-li-jp-07-30-41672-v-prod.binaryedge.ninja. |
2019-08-03 08:36:43 |
| 177.99.190.122 | attack | Aug 3 00:16:41 lnxded63 sshd[18941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.190.122 |
2019-08-03 08:41:35 |
| 189.7.129.60 | attackspambots | Aug 2 21:47:38 XXX sshd[7410]: Invalid user hannah from 189.7.129.60 port 47180 |
2019-08-03 08:08:01 |
| 80.211.94.29 | attackspambots | FTP: login Brute Force attempt, PTR: host29-94-211-80.serverdedicati.aruba.it. |
2019-08-03 08:32:54 |
| 177.101.255.26 | attackbotsspam | Aug 2 21:01:49 mail sshd\[30604\]: Failed password for invalid user uno85 from 177.101.255.26 port 46206 ssh2 Aug 2 21:18:23 mail sshd\[30862\]: Invalid user rocco from 177.101.255.26 port 40168 ... |
2019-08-03 08:52:00 |
| 108.178.61.59 | attackspambots | 3389BruteforceFW22 |
2019-08-03 08:49:31 |
| 157.122.179.120 | attack | Aug 3 03:23:29 localhost sshd[31490]: Invalid user webdata from 157.122.179.120 port 58313 Aug 3 03:23:29 localhost sshd[31490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.122.179.120 Aug 3 03:23:29 localhost sshd[31490]: Invalid user webdata from 157.122.179.120 port 58313 Aug 3 03:23:31 localhost sshd[31490]: Failed password for invalid user webdata from 157.122.179.120 port 58313 ssh2 ... |
2019-08-03 08:42:38 |
| 178.17.171.102 | attackbots | 2019-08-02T15:24:04.782101WS-Zach sshd[25983]: User root from 178.17.171.102 not allowed because none of user's groups are listed in AllowGroups 2019-08-02T15:24:08.400558WS-Zach sshd[26016]: User root from 178.17.171.102 not allowed because none of user's groups are listed in AllowGroups 2019-08-02T15:24:08.411547WS-Zach sshd[26016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.17.171.102 user=root 2019-08-02T15:24:08.400558WS-Zach sshd[26016]: User root from 178.17.171.102 not allowed because none of user's groups are listed in AllowGroups 2019-08-02T15:24:10.588988WS-Zach sshd[26016]: Failed password for invalid user root from 178.17.171.102 port 60372 ssh2 ... |
2019-08-03 08:14:19 |
| 148.70.63.163 | attack | Aug 3 02:08:17 localhost sshd\[22981\]: Invalid user git from 148.70.63.163 port 56062 Aug 3 02:08:17 localhost sshd\[22981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.63.163 Aug 3 02:08:18 localhost sshd\[22981\]: Failed password for invalid user git from 148.70.63.163 port 56062 ssh2 |
2019-08-03 08:19:31 |
| 165.227.220.178 | attackspam | 2019-08-02T22:07:33.488455abusebot-8.cloudsearch.cf sshd\[24042\]: Invalid user 123456 from 165.227.220.178 port 42424 |
2019-08-03 08:17:41 |
| 108.178.61.58 | attackspambots | 3389BruteforceFW22 |
2019-08-03 08:45:51 |