City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 80.245.106.242 | attackbotsspam | Invalid user team1 from 80.245.106.242 port 44824 |
2020-08-29 05:49:47 |
| 80.245.106.3 | attackbotsspam | $f2bV_matches |
2019-10-09 23:46:07 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.245.106.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.245.106.131. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:46:57 CST 2025
;; MSG SIZE rcvd: 107
131.106.245.80.in-addr.arpa domain name pointer 80.245.106.131.dynamic-pppoe.dt.ipv4.wtnet.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
131.106.245.80.in-addr.arpa name = 80.245.106.131.dynamic-pppoe.dt.ipv4.wtnet.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 198.211.109.208 | attack | 2020-05-29T06:24:48.873032shield sshd\[17940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.109.208 user=root 2020-05-29T06:24:51.162884shield sshd\[17940\]: Failed password for root from 198.211.109.208 port 54056 ssh2 2020-05-29T06:28:19.855630shield sshd\[18607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.109.208 user=root 2020-05-29T06:28:22.108992shield sshd\[18607\]: Failed password for root from 198.211.109.208 port 58832 ssh2 2020-05-29T06:31:44.863817shield sshd\[19352\]: Invalid user admin from 198.211.109.208 port 35376 |
2020-05-29 14:37:34 |
| 14.98.213.14 | attack | May 29 07:56:02 eventyay sshd[7025]: Failed password for root from 14.98.213.14 port 48510 ssh2 May 29 08:00:11 eventyay sshd[7166]: Failed password for root from 14.98.213.14 port 52810 ssh2 ... |
2020-05-29 14:44:52 |
| 202.149.89.84 | attack | May 29 07:39:43 tuxlinux sshd[56748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.149.89.84 user=root May 29 07:39:45 tuxlinux sshd[56748]: Failed password for root from 202.149.89.84 port 37739 ssh2 May 29 07:39:43 tuxlinux sshd[56748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.149.89.84 user=root May 29 07:39:45 tuxlinux sshd[56748]: Failed password for root from 202.149.89.84 port 37739 ssh2 May 29 07:50:12 tuxlinux sshd[56982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.149.89.84 user=root ... |
2020-05-29 14:39:28 |
| 185.23.80.95 | attack | Unauthorised access (May 29) SRC=185.23.80.95 LEN=52 PREC=0x20 TTL=121 ID=18993 DF TCP DPT=445 WINDOW=8192 SYN |
2020-05-29 14:35:02 |
| 202.83.27.171 | attack | 20/5/28@23:54:16: FAIL: Alarm-Intrusion address from=202.83.27.171 ... |
2020-05-29 14:16:34 |
| 14.186.35.113 | attackbotsspam | Port probing on unauthorized port 445 |
2020-05-29 14:23:22 |
| 1.192.121.238 | attack | prod11 ... |
2020-05-29 14:20:14 |
| 171.103.38.166 | attackbots | Dovecot Invalid User Login Attempt. |
2020-05-29 14:21:58 |
| 52.187.130.217 | attackspam | May 28 22:08:51 dignus sshd[32414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.130.217 user=root May 28 22:08:53 dignus sshd[32414]: Failed password for root from 52.187.130.217 port 46696 ssh2 May 28 22:13:01 dignus sshd[32617]: Invalid user test from 52.187.130.217 port 52522 May 28 22:13:01 dignus sshd[32617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.130.217 May 28 22:13:03 dignus sshd[32617]: Failed password for invalid user test from 52.187.130.217 port 52522 ssh2 ... |
2020-05-29 14:14:40 |
| 220.85.206.96 | attackspam | May 29 07:09:22 ArkNodeAT sshd\[8183\]: Invalid user ubuntu from 220.85.206.96 May 29 07:09:22 ArkNodeAT sshd\[8183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.85.206.96 May 29 07:09:24 ArkNodeAT sshd\[8183\]: Failed password for invalid user ubuntu from 220.85.206.96 port 53830 ssh2 |
2020-05-29 14:24:46 |
| 2607:f8b0:4002:c08::1a | attackspambots | Bulletproof hosting of fmfnigeria21@gmail.com phishing account |
2020-05-29 14:46:20 |
| 49.234.27.90 | attackspam | Wordpress malicious attack:[sshd] |
2020-05-29 14:29:30 |
| 139.186.67.159 | attack | May 29 09:54:16 dhoomketu sshd[289055]: Invalid user hundsun from 139.186.67.159 port 37862 May 29 09:54:16 dhoomketu sshd[289055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.67.159 May 29 09:54:16 dhoomketu sshd[289055]: Invalid user hundsun from 139.186.67.159 port 37862 May 29 09:54:18 dhoomketu sshd[289055]: Failed password for invalid user hundsun from 139.186.67.159 port 37862 ssh2 May 29 09:56:58 dhoomketu sshd[289102]: Invalid user postgres from 139.186.67.159 port 40244 ... |
2020-05-29 14:42:48 |
| 139.59.88.70 | attackbots | SSH Scan |
2020-05-29 14:28:13 |
| 2607:f8b0:4024:c00::1b | attackbotsspam | Bulletproof hosting of fmfnigeria21@gmail.com phishing account |
2020-05-29 14:11:35 |