City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.53.153.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;78.53.153.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 17:27:31 CST 2025
;; MSG SIZE rcvd: 105
14.153.53.78.in-addr.arpa domain name pointer dynamic-078-053-153-014.78.53.pool.telefonica.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.153.53.78.in-addr.arpa name = dynamic-078-053-153-014.78.53.pool.telefonica.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
112.85.42.172 | attackspambots | SSH authentication failure x 6 reported by Fail2Ban ... |
2019-08-10 12:21:30 |
101.231.146.36 | attackspambots | 2019-08-10T04:42:34.8401501240 sshd\[27180\]: Invalid user samad from 101.231.146.36 port 36844 2019-08-10T04:42:34.8480301240 sshd\[27180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.146.36 2019-08-10T04:42:36.8896211240 sshd\[27180\]: Failed password for invalid user samad from 101.231.146.36 port 36844 ssh2 ... |
2019-08-10 12:45:54 |
49.88.112.64 | attack | 2019-08-10T06:07:24.837890centos sshd\[14361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.64 user=root 2019-08-10T06:07:26.647998centos sshd\[14361\]: Failed password for root from 49.88.112.64 port 30323 ssh2 2019-08-10T06:07:29.655652centos sshd\[14361\]: Failed password for root from 49.88.112.64 port 30323 ssh2 |
2019-08-10 12:18:26 |
128.199.79.37 | attackbotsspam | Invalid user susan from 128.199.79.37 port 32833 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.79.37 Failed password for invalid user susan from 128.199.79.37 port 32833 ssh2 Invalid user gareth from 128.199.79.37 port 57402 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.79.37 |
2019-08-10 12:33:42 |
24.35.80.137 | attack | Aug 10 02:43:01 work-partkepr sshd\[21594\]: Invalid user fy from 24.35.80.137 port 60000 Aug 10 02:43:01 work-partkepr sshd\[21594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.35.80.137 ... |
2019-08-10 12:38:39 |
77.247.110.20 | attackspam | \[2019-08-10 00:30:38\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-10T00:30:38.126-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="950648422069019",SessionID="0x7ff4d07e79a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.20/63769",ACLName="no_extension_match" \[2019-08-10 00:32:30\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-10T00:32:30.379-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="001948243625002",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.20/60763",ACLName="no_extension_match" \[2019-08-10 00:35:20\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-10T00:35:20.180-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="950748422069019",SessionID="0x7ff4d0348688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.20/51234",ACLName="no_ext |
2019-08-10 12:47:33 |
212.12.64.194 | attackbots | [portscan] Port scan |
2019-08-10 12:04:24 |
51.68.243.1 | attack | Aug 10 06:37:59 SilenceServices sshd[3320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.243.1 Aug 10 06:38:01 SilenceServices sshd[3320]: Failed password for invalid user lmondon from 51.68.243.1 port 54190 ssh2 Aug 10 06:41:56 SilenceServices sshd[6512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.243.1 |
2019-08-10 12:42:21 |
151.26.34.76 | attack | Automatic report - Port Scan Attack |
2019-08-10 12:17:06 |
209.17.97.58 | attackspam | Automatic report - Banned IP Access |
2019-08-10 12:16:04 |
121.162.235.44 | attackspam | Aug 10 02:44:23 unicornsoft sshd\[3685\]: Invalid user squid from 121.162.235.44 Aug 10 02:44:23 unicornsoft sshd\[3685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.235.44 Aug 10 02:44:26 unicornsoft sshd\[3685\]: Failed password for invalid user squid from 121.162.235.44 port 57992 ssh2 |
2019-08-10 12:05:30 |
157.230.212.42 | attack | WordPress wp-login brute force :: 157.230.212.42 0.048 BYPASS [10/Aug/2019:12:44:50 1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-08-10 11:57:04 |
195.154.38.177 | attackbots | Aug 10 05:42:50 server01 sshd\[28239\]: Invalid user abacus from 195.154.38.177 Aug 10 05:42:50 server01 sshd\[28239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.38.177 Aug 10 05:42:52 server01 sshd\[28239\]: Failed password for invalid user abacus from 195.154.38.177 port 35252 ssh2 ... |
2019-08-10 12:41:09 |
77.42.104.1 | attackbotsspam | Telnet Server BruteForce Attack |
2019-08-10 12:24:45 |
59.152.196.154 | attackspambots | Aug 10 03:58:39 localhost sshd\[11750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.196.154 user=root Aug 10 03:58:41 localhost sshd\[11750\]: Failed password for root from 59.152.196.154 port 56735 ssh2 Aug 10 04:06:32 localhost sshd\[11957\]: Invalid user onie from 59.152.196.154 port 54842 Aug 10 04:06:32 localhost sshd\[11957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.196.154 Aug 10 04:06:34 localhost sshd\[11957\]: Failed password for invalid user onie from 59.152.196.154 port 54842 ssh2 ... |
2019-08-10 12:32:07 |