City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.16.114.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.16.114.34. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 22:52:50 CST 2025
;; MSG SIZE rcvd: 105
34.114.16.85.in-addr.arpa domain name pointer housing-085-016-114-034.ewe-ip-backbone.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.114.16.85.in-addr.arpa name = housing-085-016-114-034.ewe-ip-backbone.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
128.199.224.215 | attack | Fail2Ban - SSH Bruteforce Attempt |
2020-05-11 15:58:55 |
120.148.222.243 | attackbotsspam | Invalid user ubuntu from 120.148.222.243 port 40332 |
2020-05-11 15:25:17 |
80.82.77.212 | attackbots | firewall-block, port(s): 3702/udp |
2020-05-11 16:00:10 |
112.186.79.4 | attackspambots | May 11 08:23:53 l02a sshd[21272]: Invalid user fj from 112.186.79.4 May 11 08:23:53 l02a sshd[21272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.79.4 May 11 08:23:53 l02a sshd[21272]: Invalid user fj from 112.186.79.4 May 11 08:23:54 l02a sshd[21272]: Failed password for invalid user fj from 112.186.79.4 port 54514 ssh2 |
2020-05-11 15:56:42 |
116.104.74.95 | attackbotsspam | 20/5/11@00:57:19: FAIL: Alarm-Network address from=116.104.74.95 20/5/11@00:57:19: FAIL: Alarm-Network address from=116.104.74.95 ... |
2020-05-11 15:58:31 |
140.143.167.2 | attackbotsspam | May 11 10:07:50 pkdns2 sshd\[59345\]: Invalid user cristopher from 140.143.167.2May 11 10:07:52 pkdns2 sshd\[59345\]: Failed password for invalid user cristopher from 140.143.167.2 port 39408 ssh2May 11 10:12:25 pkdns2 sshd\[59599\]: Invalid user guest10 from 140.143.167.2May 11 10:12:27 pkdns2 sshd\[59599\]: Failed password for invalid user guest10 from 140.143.167.2 port 60474 ssh2May 11 10:16:51 pkdns2 sshd\[59826\]: Invalid user miner from 140.143.167.2May 11 10:16:53 pkdns2 sshd\[59826\]: Failed password for invalid user miner from 140.143.167.2 port 53308 ssh2 ... |
2020-05-11 15:41:56 |
128.199.33.116 | attackspambots | <6 unauthorized SSH connections |
2020-05-11 15:41:16 |
180.76.177.237 | attackbotsspam | May 11 11:56:34 webhost01 sshd[19870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.177.237 May 11 11:56:36 webhost01 sshd[19870]: Failed password for invalid user english from 180.76.177.237 port 49528 ssh2 ... |
2020-05-11 15:31:43 |
187.162.51.63 | attackspam | May 11 08:30:57 ns381471 sshd[21995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.162.51.63 May 11 08:30:59 ns381471 sshd[21995]: Failed password for invalid user vps from 187.162.51.63 port 50315 ssh2 |
2020-05-11 15:47:27 |
23.244.61.17 | attack | Sniffing for configuration: 23.244.61.17 - - [11/May/2020:06:49:30 +0100] "GET /utility/convert/index.php?a=config&source=d7.2_x2.0 HTTP/1.1" 404 294 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; en) Opera 9.50" |
2020-05-11 15:32:20 |
176.31.102.37 | attackspambots | (sshd) Failed SSH login from 176.31.102.37 (FR/France/ns389831.ip-176-31-102.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 11 09:18:09 s1 sshd[17869]: Invalid user test from 176.31.102.37 port 50901 May 11 09:18:12 s1 sshd[17869]: Failed password for invalid user test from 176.31.102.37 port 50901 ssh2 May 11 10:11:33 s1 sshd[20168]: Invalid user ftpuser from 176.31.102.37 port 57920 May 11 10:11:35 s1 sshd[20168]: Failed password for invalid user ftpuser from 176.31.102.37 port 57920 ssh2 May 11 10:15:11 s1 sshd[20331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.102.37 user=root |
2020-05-11 15:24:48 |
34.92.209.215 | attackbotsspam | May 11 16:18:41 localhost sshd[1037881]: Invalid user catering from 34.92.209.215 port 47760 ... |
2020-05-11 15:39:09 |
106.12.52.59 | attack | $f2bV_matches |
2020-05-11 15:25:42 |
80.211.135.26 | attack | May 11 02:50:24 ny01 sshd[3670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.135.26 May 11 02:50:26 ny01 sshd[3670]: Failed password for invalid user hadoop from 80.211.135.26 port 32778 ssh2 May 11 02:52:43 ny01 sshd[3942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.135.26 |
2020-05-11 15:19:09 |
159.203.219.38 | attack | Invalid user test6 from 159.203.219.38 port 37572 |
2020-05-11 15:22:47 |