City: Köln
Region: Nordrhein-Westfalen
Country: Germany
Internet Service Provider: Telekom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.34.196.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;78.34.196.81. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:41:55 CST 2025
;; MSG SIZE rcvd: 105
81.196.34.78.in-addr.arpa domain name pointer xdsl-78-34-196-81.nc.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
81.196.34.78.in-addr.arpa name = xdsl-78-34-196-81.nc.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 13.92.102.210 | attack | *Port Scan* detected from 13.92.102.210 (US/United States/-). 4 hits in the last 10 seconds |
2020-02-25 10:13:54 |
| 212.152.61.82 | attackbotsspam | suspicious action Mon, 24 Feb 2020 20:22:58 -0300 |
2020-02-25 10:18:57 |
| 162.219.253.20 | attackbotsspam | Feb 25 00:14:20 pl1server sshd[13929]: Invalid user admin from 162.219.253.20 Feb 25 00:14:20 pl1server sshd[13929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.219.253.20 Feb 25 00:14:22 pl1server sshd[13929]: Failed password for invalid user admin from 162.219.253.20 port 54453 ssh2 Feb 25 00:14:22 pl1server sshd[13929]: Connection closed by 162.219.253.20 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=162.219.253.20 |
2020-02-25 09:51:21 |
| 119.29.16.190 | attack | Feb 25 00:03:40 DNS-2 sshd[12312]: Invalid user max from 119.29.16.190 port 33954 Feb 25 00:03:41 DNS-2 sshd[12312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.16.190 Feb 25 00:03:43 DNS-2 sshd[12312]: Failed password for invalid user max from 119.29.16.190 port 33954 ssh2 Feb 25 00:03:43 DNS-2 sshd[12312]: Received disconnect from 119.29.16.190 port 33954:11: Bye Bye [preauth] Feb 25 00:03:43 DNS-2 sshd[12312]: Disconnected from invalid user max 119.29.16.190 port 33954 [preauth] Feb 25 00:13:07 DNS-2 sshd[13574]: Invalid user servere from 119.29.16.190 port 50525 Feb 25 00:13:07 DNS-2 sshd[13574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.16.190 Feb 25 00:13:09 DNS-2 sshd[13574]: Failed password for invalid user servere from 119.29.16.190 port 50525 ssh2 Feb 25 00:13:10 DNS-2 sshd[13574]: Received disconnect from 119.29.16.190 port 50525:11: Bye Bye [preauth] Feb........ ------------------------------- |
2020-02-25 10:26:08 |
| 222.97.6.154 | attackspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-25 09:59:50 |
| 111.161.74.100 | attackbots | 20 attempts against mh-ssh on cloud |
2020-02-25 09:59:08 |
| 180.244.233.7 | attack | SMB Server BruteForce Attack |
2020-02-25 09:55:14 |
| 144.217.214.100 | attack | Feb 25 01:29:15 game-panel sshd[20851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.214.100 Feb 25 01:29:18 game-panel sshd[20851]: Failed password for invalid user amanda from 144.217.214.100 port 51428 ssh2 Feb 25 01:38:58 game-panel sshd[21182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.214.100 |
2020-02-25 09:52:08 |
| 189.226.123.71 | attackbots | Honeypot attack, port: 81, PTR: dsl-189-226-123-71-dyn.prod-infinitum.com.mx. |
2020-02-25 10:10:20 |
| 77.79.132.44 | attack | Honeypot attack, port: 81, PTR: 77.79.132.44.static.neft.ufanet.ru. |
2020-02-25 10:17:57 |
| 175.207.13.22 | attackspambots | Feb 25 01:54:47 zeus sshd[5250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.22 Feb 25 01:54:49 zeus sshd[5250]: Failed password for invalid user carol from 175.207.13.22 port 55468 ssh2 Feb 25 02:04:04 zeus sshd[5495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.22 Feb 25 02:04:05 zeus sshd[5495]: Failed password for invalid user cpanel from 175.207.13.22 port 50360 ssh2 |
2020-02-25 10:04:48 |
| 191.84.208.54 | attackspambots | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-25 10:00:10 |
| 113.182.8.157 | attack | Automatic report - Port Scan Attack |
2020-02-25 10:07:23 |
| 183.56.54.83 | attack | 2020-02-25T00:23:21.620152 X postfix/smtpd[5329]: lost connection after AUTH from unknown[183.56.54.83] 2020-02-25T00:23:22.502494 X postfix/smtpd[5329]: lost connection after AUTH from unknown[183.56.54.83] 2020-02-25T00:23:23.377108 X postfix/smtpd[5329]: lost connection after AUTH from unknown[183.56.54.83] |
2020-02-25 09:49:18 |
| 120.132.124.237 | attackbotsspam | Feb 24 16:14:01 php1 sshd\[26308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.124.237 user=mysql Feb 24 16:14:02 php1 sshd\[26308\]: Failed password for mysql from 120.132.124.237 port 52762 ssh2 Feb 24 16:18:19 php1 sshd\[26740\]: Invalid user oracle from 120.132.124.237 Feb 24 16:18:19 php1 sshd\[26740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.124.237 Feb 24 16:18:21 php1 sshd\[26740\]: Failed password for invalid user oracle from 120.132.124.237 port 54596 ssh2 |
2020-02-25 10:22:32 |