City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.16.135.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15457
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.16.135.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 147 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 21:31:44 CST 2025
;; MSG SIZE rcvd: 105
29.135.16.85.in-addr.arpa domain name pointer ll-static-085-016-135-029.ewe-ip-backbone.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.135.16.85.in-addr.arpa name = ll-static-085-016-135-029.ewe-ip-backbone.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.175.212 | attack | 2020-04-09T23:37:04.946217abusebot-7.cloudsearch.cf sshd[23799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212 user=root 2020-04-09T23:37:06.874338abusebot-7.cloudsearch.cf sshd[23799]: Failed password for root from 222.186.175.212 port 31054 ssh2 2020-04-09T23:37:10.232466abusebot-7.cloudsearch.cf sshd[23799]: Failed password for root from 222.186.175.212 port 31054 ssh2 2020-04-09T23:37:04.946217abusebot-7.cloudsearch.cf sshd[23799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212 user=root 2020-04-09T23:37:06.874338abusebot-7.cloudsearch.cf sshd[23799]: Failed password for root from 222.186.175.212 port 31054 ssh2 2020-04-09T23:37:10.232466abusebot-7.cloudsearch.cf sshd[23799]: Failed password for root from 222.186.175.212 port 31054 ssh2 2020-04-09T23:37:04.946217abusebot-7.cloudsearch.cf sshd[23799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... |
2020-04-10 07:43:45 |
| 112.13.198.138 | attackspam | Apr 9 23:56:53 mail sshd[7147]: Invalid user es from 112.13.198.138 Apr 9 23:56:53 mail sshd[7147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.13.198.138 Apr 9 23:56:53 mail sshd[7147]: Invalid user es from 112.13.198.138 Apr 9 23:56:54 mail sshd[7147]: Failed password for invalid user es from 112.13.198.138 port 2660 ssh2 Apr 10 00:13:25 mail sshd[9804]: Invalid user admin from 112.13.198.138 ... |
2020-04-10 07:55:36 |
| 141.98.80.204 | attackbotsspam | 04/09/2020-19:03:42.570412 141.98.80.204 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-10 07:29:58 |
| 201.157.194.106 | attackbots | DATE:2020-04-10 00:59:49, IP:201.157.194.106, PORT:ssh SSH brute force auth (docker-dc) |
2020-04-10 07:24:50 |
| 190.64.213.155 | attackspam | Automatic report BANNED IP |
2020-04-10 07:25:19 |
| 139.59.69.76 | attack | Apr 10 00:50:55 santamaria sshd\[21923\]: Invalid user gpadmin from 139.59.69.76 Apr 10 00:50:55 santamaria sshd\[21923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.69.76 Apr 10 00:50:57 santamaria sshd\[21923\]: Failed password for invalid user gpadmin from 139.59.69.76 port 39950 ssh2 ... |
2020-04-10 07:16:28 |
| 188.166.117.213 | attack | Apr 10 01:06:58 vmd26974 sshd[18019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213 Apr 10 01:07:00 vmd26974 sshd[18019]: Failed password for invalid user dmc from 188.166.117.213 port 59206 ssh2 ... |
2020-04-10 07:52:01 |
| 157.245.96.139 | attack | 157.245.96.139 - - [09/Apr/2020:23:56:07 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 157.245.96.139 - - [09/Apr/2020:23:56:09 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 157.245.96.139 - - [09/Apr/2020:23:56:15 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-10 07:17:18 |
| 188.173.230.112 | attackspambots | SSH-bruteforce attempts |
2020-04-10 07:27:20 |
| 2604:a880:400:d1::6ae:1 | attackbotsspam | [ThuApr0923:56:13.2802622020][:error][pid31567:tid47172301100800][client2604:a880:400:d1::6ae:1:56900][client2604:a880:400:d1::6ae:1]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?i\)\(\?:\\\\\\\\x5c\|\(\?:%\(\?:2\(\?:5\(\?:2f\|5c\)\|F\|f\)\|c\(\?:0%\(\?:9v\|af\)\|1\)\|u\(\?:221[56]\|002f\)\|2\(\?:F\|F\)\|e0??\|1u\|5c\)\|\\\\\\\\/\)\)\(\?:%\(\?:2\(\?:\(\?:52\)\?e\|E\)\|\(\?:e0%8\|c\)0?\|u\(\?:002e\|2024\)\|2\(\?:E\|E\)\)\|\\\\\\\\.\){2}\(\?:\\\\\\\\x5c\|\(\?:%\(\?:2\(\?:5\(\?:2f\|5c\)\|F\|f\)\|c\(\?:0%\(\?:9v\|af\)\|1\)\|..."atARGS:input_file.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"198"][id"340007"][rev"47"][msg"Atomicorp.comWAFRules:GenericPathRecursiondenied"][data"/../\,ARGS:input_file"][severity"CRITICAL"][hostname"www.photo-events.ch"][uri"/wp-content/plugins/post-pdf-export/dompdf/dompdf.php"][unique_id"Xo@Z-TFSnThLNzjdd7xtmgAAAMc"][ThuApr0923:56:15.1109372020][:error][pid31491:tid47172303202048][client2604:a880:400:d1::6ae:1:60786][ |
2020-04-10 07:19:11 |
| 116.112.64.98 | attack | Apr 10 00:42:26 vpn01 sshd[26694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.112.64.98 Apr 10 00:42:28 vpn01 sshd[26694]: Failed password for invalid user elite from 116.112.64.98 port 47702 ssh2 ... |
2020-04-10 07:16:12 |
| 49.234.108.12 | attackspam | Apr 9 23:02:36 sigma sshd\[2261\]: Invalid user deploy from 49.234.108.12Apr 9 23:02:38 sigma sshd\[2261\]: Failed password for invalid user deploy from 49.234.108.12 port 35658 ssh2 ... |
2020-04-10 07:17:42 |
| 191.239.245.229 | attackspambots | (sshd) Failed SSH login from 191.239.245.229 (BR/Brazil/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 9 18:54:18 host sshd[85063]: Invalid user hzc from 191.239.245.229 port 54900 |
2020-04-10 07:47:50 |
| 43.225.27.6 | attackspam | Port probing on unauthorized port 1433 |
2020-04-10 07:49:19 |
| 111.229.155.212 | attackbotsspam | Automatic report BANNED IP |
2020-04-10 07:54:41 |