City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.181.18.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.181.18.48. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 14:30:45 CST 2025
;; MSG SIZE rcvd: 105
48.18.181.85.in-addr.arpa domain name pointer dynamic-085-181-018-048.85.181.pool.telefonica.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
48.18.181.85.in-addr.arpa name = dynamic-085-181-018-048.85.181.pool.telefonica.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
165.22.174.17 | attack | 10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined node-superagent/4.1.0 |
2019-08-02 19:13:38 |
138.255.14.125 | attackbots | Jul 31 07:17:30 our-server-hostname postfix/smtpd[21057]: connect from unknown[138.255.14.125] Jul x@x Jul x@x Jul x@x Jul 31 07:17:38 our-server-hostname postfix/smtpd[21057]: lost connection after RCPT from unknown[138.255.14.125] Jul 31 07:17:38 our-server-hostname postfix/smtpd[21057]: disconnect from unknown[138.255.14.125] Jul 31 08:36:58 our-server-hostname postfix/smtpd[19335]: connect from unknown[138.255.14.125] Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=138.255.14.125 |
2019-08-02 18:06:06 |
31.29.34.98 | attack | Automatic report - Port Scan Attack |
2019-08-02 19:20:57 |
182.61.175.96 | attackspam | Aug 2 10:50:01 amit sshd\[26075\]: Invalid user jb from 182.61.175.96 Aug 2 10:50:01 amit sshd\[26075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.96 Aug 2 10:50:03 amit sshd\[26075\]: Failed password for invalid user jb from 182.61.175.96 port 47824 ssh2 ... |
2019-08-02 18:57:36 |
162.243.67.126 | attackspambots | 10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined node-superagent/4.1.0 |
2019-08-02 18:44:29 |
182.61.164.210 | attackbots | Aug 2 11:54:23 microserver sshd[29849]: Invalid user airadmin from 182.61.164.210 port 59514 Aug 2 11:54:23 microserver sshd[29849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.164.210 Aug 2 11:54:25 microserver sshd[29849]: Failed password for invalid user airadmin from 182.61.164.210 port 59514 ssh2 Aug 2 11:59:25 microserver sshd[30617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.164.210 user=root Aug 2 11:59:27 microserver sshd[30617]: Failed password for root from 182.61.164.210 port 54546 ssh2 Aug 2 12:09:39 microserver sshd[32068]: Invalid user karolina from 182.61.164.210 port 44880 Aug 2 12:09:39 microserver sshd[32068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.164.210 Aug 2 12:09:41 microserver sshd[32068]: Failed password for invalid user karolina from 182.61.164.210 port 44880 ssh2 Aug 2 12:14:41 microserver sshd[32751]: Invalid user |
2019-08-02 19:05:43 |
188.131.153.253 | attackspambots | Aug 2 11:53:36 OPSO sshd\[31828\]: Invalid user dell from 188.131.153.253 port 44016 Aug 2 11:53:36 OPSO sshd\[31828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.153.253 Aug 2 11:53:38 OPSO sshd\[31828\]: Failed password for invalid user dell from 188.131.153.253 port 44016 ssh2 Aug 2 11:56:11 OPSO sshd\[32208\]: Invalid user test2 from 188.131.153.253 port 56636 Aug 2 11:56:11 OPSO sshd\[32208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.153.253 |
2019-08-02 19:20:01 |
72.137.253.122 | attackbots | Jul 30 22:52:13 indra sshd[104121]: Address 72.137.253.122 maps to cpe00fc8d4c7d73-cm00fc8d4c7d70.cpe.net.cable.rogers.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 30 22:52:13 indra sshd[104121]: Invalid user crap from 72.137.253.122 Jul 30 22:52:13 indra sshd[104121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.137.253.122 Jul 30 22:52:16 indra sshd[104121]: Failed password for invalid user crap from 72.137.253.122 port 46634 ssh2 Jul 30 22:52:16 indra sshd[104121]: Received disconnect from 72.137.253.122: 11: Bye Bye [preauth] Jul 30 23:00:09 indra sshd[105775]: Address 72.137.253.122 maps to cpe00fc8d4c7d73-cm00fc8d4c7d70.cpe.net.cable.rogers.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 30 23:00:09 indra sshd[105775]: Invalid user www from 72.137.253.122 Jul 30 23:00:09 indra sshd[105775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu........ ------------------------------- |
2019-08-02 18:05:07 |
190.85.69.70 | attackbots | firewall-block, port(s): 23/tcp |
2019-08-02 18:24:29 |
213.226.117.44 | attackbots | namecheap spam |
2019-08-02 19:19:10 |
218.92.0.158 | attackspam | Aug 2 10:49:29 nextcloud sshd\[5592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158 user=root Aug 2 10:49:31 nextcloud sshd\[5592\]: Failed password for root from 218.92.0.158 port 49785 ssh2 Aug 2 10:49:33 nextcloud sshd\[5592\]: Failed password for root from 218.92.0.158 port 49785 ssh2 ... |
2019-08-02 19:17:22 |
61.160.247.47 | attackspambots | Port Scan 1433 |
2019-08-02 19:20:36 |
115.85.65.122 | attackbots | Trying to access my steam account inumerous times |
2019-08-02 19:14:38 |
221.218.40.104 | attackspam | Aug 2 11:30:50 * sshd[32466]: Failed password for root from 221.218.40.104 port 32787 ssh2 Aug 2 11:31:07 * sshd[32466]: error: maximum authentication attempts exceeded for root from 221.218.40.104 port 32787 ssh2 [preauth] |
2019-08-02 19:16:03 |
118.24.147.252 | attackbotsspam | 118.24.147.252 - - [02/Aug/2019:04:50:03 -0400] "POST /%75%73%65%72%2e%70%68%70 HTTP/1.1" 301 237 "554fcae493e564ee0dc75bdf2ebf94caads|a:3:{s:2:"id";s:3:"'/*";s:3:"num";s:141:"*/ union select 1,0x272F2A,3,4,5,6,7,8,0x7b247b24524345275d3b6469652f2a2a2f286d6435284449524543544f52595f534550415241544f5229293b2f2f7d7d,0--";s:4:"name";s:3:"ads";}554fcae493e564ee0dc75bdf2ebf94ca" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64; Trident/4.0)" ... |
2019-08-02 18:57:00 |