City: unknown
Region: unknown
Country: Germany
Internet Service Provider: myLoc managed IT AG
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackbots | Honeypot hit. |
2019-10-24 06:54:14 |
attack | Many RDP login attempts detected by IDS script |
2019-07-18 11:05:40 |
IP | Type | Details | Datetime |
---|---|---|---|
85.14.245.40 | attack | lfd: (smtpauth) Failed SMTP AUTH login from 85.14.245.40 (srv83039.dus2.fastwebserver.de): 5 in the last 3600 secs - Sun Jul 22 08:27:34 2018 |
2020-02-24 23:10:49 |
85.14.245.154 | attackbots | Repeated RDP login failures. Last user: alex |
2020-02-22 04:57:34 |
85.14.245.153 | attackspam | scan r |
2019-11-05 02:14:35 |
85.14.245.156 | attack | webserver:80 [09/Oct/2019] "\x03" 400 0 webserver:80 [09/Oct/2019] "\x03" 400 0 webserver:80 [08/Oct/2019] "\x03" 400 0 |
2019-10-10 04:49:24 |
85.14.245.221 | attackbots | rdp |
2019-10-05 00:04:30 |
85.14.245.158 | attackbotsspam | Bruteforcing port 3389 (Remote Desktop) - Exceed maximum 10 attempts/hour |
2019-07-14 09:35:56 |
85.14.245.157 | attack | 3389BruteforceFW22 |
2019-07-01 03:59:03 |
85.14.245.221 | attackspambots | RDP Brute-Force (Grieskirchen RZ1) |
2019-06-23 03:30:05 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.14.245.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20292
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.14.245.149. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019071701 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 18 11:05:34 CST 2019
;; MSG SIZE rcvd: 117
149.245.14.85.in-addr.arpa domain name pointer srv84068.dus2.fastwebserver.de.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
149.245.14.85.in-addr.arpa name = srv84068.dus2.fastwebserver.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
89.248.163.203 | attack | Scan port |
2023-06-26 12:53:46 |
94.142.138.228 | attack | marware host |
2023-06-18 03:03:20 |
171.251.234.150 | spam | Spam |
2023-06-11 23:56:40 |
185.253.217.234 | attack | Phishing |
2023-06-12 21:31:03 |
185.224.128.126 | attack | Scan port |
2023-06-15 12:38:08 |
167.248.133.189 | attackproxy | VPN fraud |
2023-06-15 14:29:01 |
189.126.106.47 | attack | Scan port |
2023-07-03 12:59:52 |
89.248.165.239 | attack | Scan port boot |
2023-06-21 12:37:54 |
188.237.226.148 | attack | Scan port |
2023-06-15 17:59:06 |
89.248.163.16 | spamattack | Scan port |
2023-06-20 16:48:17 |
117.206.185.123 | normal | "> |
2023-06-12 09:34:34 |
89.248.165.88 | attack | Scan port |
2023-06-13 18:12:57 |
117.206.185.123 | normal | window.location.replace("http://www.w3schools.com"); |
2023-06-12 09:42:07 |
89.248.163.16 | botsattack | Scan port |
2023-06-22 19:36:01 |
185.173.35.1 | spambotsattackproxy | Honey is a paypal thing i am victim of idenity theft useing paypal |
2023-06-23 21:04:49 |