City: Hamburg
Region: Hamburg
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.55.164.236
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;62.55.164.236. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:54:45 CST 2025
;; MSG SIZE rcvd: 106
Host 236.164.55.62.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 236.164.55.62.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 37.49.230.95 | attack | ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak |
2019-12-20 20:45:28 |
| 85.209.0.116 | attack | Dec 20 10:05:37 pl3server sshd[11436]: Did not receive identification string from 85.209.0.116 Dec 20 10:05:41 pl3server sshd[11476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.116 user=r.r Dec 20 10:05:42 pl3server sshd[11476]: Failed password for r.r from 85.209.0.116 port 50870 ssh2 Dec 20 10:05:42 pl3server sshd[11476]: Connection closed by 85.209.0.116 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=85.209.0.116 |
2019-12-20 20:12:07 |
| 218.204.132.158 | attackspambots | Host Scan |
2019-12-20 20:32:26 |
| 37.49.227.109 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 21 - port: 10001 proto: UDP cat: Misc Attack |
2019-12-20 20:17:49 |
| 110.36.233.238 | attackspambots | Unauthorized connection attempt detected from IP address 110.36.233.238 to port 445 |
2019-12-20 20:47:57 |
| 185.201.208.1 | attackbots | Host Scan |
2019-12-20 20:26:17 |
| 80.211.158.23 | attackspambots | web-1 [ssh_2] SSH Attack |
2019-12-20 20:30:38 |
| 40.124.4.131 | attackspambots | Dec 20 12:21:07 herz-der-gamer sshd[12186]: Invalid user ubuntu from 40.124.4.131 port 52976 Dec 20 12:21:07 herz-der-gamer sshd[12186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.124.4.131 Dec 20 12:21:07 herz-der-gamer sshd[12186]: Invalid user ubuntu from 40.124.4.131 port 52976 Dec 20 12:21:09 herz-der-gamer sshd[12186]: Failed password for invalid user ubuntu from 40.124.4.131 port 52976 ssh2 ... |
2019-12-20 20:28:46 |
| 139.59.136.84 | attackspambots | [munged]::443 139.59.136.84 - - [20/Dec/2019:12:50:37 +0100] "POST /[munged]: HTTP/1.1" 200 6734 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 139.59.136.84 - - [20/Dec/2019:12:50:38 +0100] "POST /[munged]: HTTP/1.1" 200 6597 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-12-20 20:27:45 |
| 142.93.1.100 | attackbots | Dec 20 02:32:32 sachi sshd\[3814\]: Invalid user pcap from 142.93.1.100 Dec 20 02:32:32 sachi sshd\[3814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100 Dec 20 02:32:35 sachi sshd\[3814\]: Failed password for invalid user pcap from 142.93.1.100 port 56984 ssh2 Dec 20 02:38:19 sachi sshd\[4412\]: Invalid user http from 142.93.1.100 Dec 20 02:38:19 sachi sshd\[4412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100 |
2019-12-20 20:43:38 |
| 40.92.20.48 | attackbots | Dec 20 09:25:12 debian-2gb-vpn-nbg1-1 kernel: [1201471.692250] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.20.48 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=234 ID=31527 DF PROTO=TCP SPT=53528 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-20 20:13:35 |
| 203.128.242.166 | attack | Dec 20 09:35:58 h2177944 sshd\[29213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166 Dec 20 09:36:00 h2177944 sshd\[29213\]: Failed password for invalid user baysek from 203.128.242.166 port 52519 ssh2 Dec 20 10:37:02 h2177944 sshd\[32454\]: Invalid user ftpguest from 203.128.242.166 port 42207 Dec 20 10:37:02 h2177944 sshd\[32454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.128.242.166 ... |
2019-12-20 20:24:14 |
| 178.128.52.97 | attackspambots | Dec 20 12:14:55 OPSO sshd\[16461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.97 user=mysql Dec 20 12:14:57 OPSO sshd\[16461\]: Failed password for mysql from 178.128.52.97 port 39600 ssh2 Dec 20 12:21:33 OPSO sshd\[17880\]: Invalid user patricia from 178.128.52.97 port 43928 Dec 20 12:21:33 OPSO sshd\[17880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.97 Dec 20 12:21:35 OPSO sshd\[17880\]: Failed password for invalid user patricia from 178.128.52.97 port 43928 ssh2 |
2019-12-20 20:49:53 |
| 51.254.38.106 | attackspam | ssh failed login |
2019-12-20 20:33:58 |
| 178.62.90.135 | attack | Dec 20 13:11:30 eventyay sshd[19742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.90.135 Dec 20 13:11:32 eventyay sshd[19742]: Failed password for invalid user dovecot from 178.62.90.135 port 43197 ssh2 Dec 20 13:17:30 eventyay sshd[19905]: Failed password for root from 178.62.90.135 port 47952 ssh2 ... |
2019-12-20 20:29:18 |