City: Rudolstadt
Region: Thüringen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 91.137.99.234 | attackspambots | Invalid user sharra from 91.137.99.234 port 50766 |
2020-05-28 16:06:47 |
| 91.137.99.234 | attackspambots | May 27 14:58:00 vps sshd[749263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.137.99.234 user=root May 27 14:58:02 vps sshd[749263]: Failed password for root from 91.137.99.234 port 38799 ssh2 May 27 15:02:05 vps sshd[769975]: Invalid user tucker from 91.137.99.234 port 42604 May 27 15:02:05 vps sshd[769975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.137.99.234 May 27 15:02:07 vps sshd[769975]: Failed password for invalid user tucker from 91.137.99.234 port 42604 ssh2 ... |
2020-05-27 21:08:17 |
| 91.137.99.234 | attack | May 26 09:45:01 sticky sshd\[26233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.137.99.234 user=root May 26 09:45:03 sticky sshd\[26233\]: Failed password for root from 91.137.99.234 port 36250 ssh2 May 26 09:48:53 sticky sshd\[26293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.137.99.234 user=root May 26 09:48:55 sticky sshd\[26293\]: Failed password for root from 91.137.99.234 port 38959 ssh2 May 26 09:52:37 sticky sshd\[26388\]: Invalid user mossing from 91.137.99.234 port 41650 |
2020-05-26 16:37:17 |
| 91.137.99.234 | attackspambots | May 26 08:34:10 sticky sshd\[25041\]: Invalid user default from 91.137.99.234 port 44115 May 26 08:34:10 sticky sshd\[25041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.137.99.234 May 26 08:34:12 sticky sshd\[25041\]: Failed password for invalid user default from 91.137.99.234 port 44115 ssh2 May 26 08:38:04 sticky sshd\[25057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.137.99.234 user=root May 26 08:38:06 sticky sshd\[25057\]: Failed password for root from 91.137.99.234 port 46815 ssh2 |
2020-05-26 14:48:25 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.137.9.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.137.9.144. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 03:23:38 CST 2025
;; MSG SIZE rcvd: 105
Host 144.9.137.91.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 144.9.137.91.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 202.163.116.202 | attackspam | Aug 8 04:08:01 localhost kernel: [16495874.798900] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=202.163.116.202 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=36389 PROTO=TCP SPT=59247 DPT=445 SEQ=3765039078 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 8 17:51:19 localhost kernel: [16545273.163369] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=202.163.116.202 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=45809 PROTO=TCP SPT=58189 DPT=445 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 8 17:51:19 localhost kernel: [16545273.163377] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=202.163.116.202 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=45809 PROTO=TCP SPT=58189 DPT=445 SEQ=3734688562 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-08-09 08:57:57 |
| 132.232.108.143 | attackbots | Aug 8 23:50:42 v22018076622670303 sshd\[28852\]: Invalid user teamspeak from 132.232.108.143 port 39122 Aug 8 23:50:42 v22018076622670303 sshd\[28852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.108.143 Aug 8 23:50:44 v22018076622670303 sshd\[28852\]: Failed password for invalid user teamspeak from 132.232.108.143 port 39122 ssh2 ... |
2019-08-09 09:18:30 |
| 54.39.18.237 | attack | Aug 9 00:43:35 localhost sshd\[92703\]: Invalid user chantal from 54.39.18.237 port 34628 Aug 9 00:43:35 localhost sshd\[92703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.18.237 Aug 9 00:43:38 localhost sshd\[92703\]: Failed password for invalid user chantal from 54.39.18.237 port 34628 ssh2 Aug 9 00:47:54 localhost sshd\[92789\]: Invalid user manuel from 54.39.18.237 port 58890 Aug 9 00:47:54 localhost sshd\[92789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.18.237 ... |
2019-08-09 09:10:44 |
| 80.86.93.126 | attackbotsspam | Aug 9 03:38:55 www sshd\[53924\]: Invalid user rafi from 80.86.93.126Aug 9 03:38:57 www sshd\[53924\]: Failed password for invalid user rafi from 80.86.93.126 port 34202 ssh2Aug 9 03:43:02 www sshd\[54050\]: Invalid user miller from 80.86.93.126 ... |
2019-08-09 08:43:08 |
| 54.38.82.14 | attack | Aug 8 19:58:52 vps200512 sshd\[13817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=root Aug 8 19:58:54 vps200512 sshd\[13817\]: Failed password for root from 54.38.82.14 port 40842 ssh2 Aug 8 19:58:55 vps200512 sshd\[13819\]: Invalid user admin from 54.38.82.14 Aug 8 19:58:55 vps200512 sshd\[13819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 Aug 8 19:58:57 vps200512 sshd\[13819\]: Failed password for invalid user admin from 54.38.82.14 port 35802 ssh2 |
2019-08-09 08:42:07 |
| 167.99.76.71 | attackbots | 2019-08-08T23:51:48.982010centos sshd\[31948\]: Invalid user garrysmod from 167.99.76.71 port 37186 2019-08-08T23:51:48.986879centos sshd\[31948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.76.71 2019-08-08T23:51:51.116481centos sshd\[31948\]: Failed password for invalid user garrysmod from 167.99.76.71 port 37186 ssh2 |
2019-08-09 08:47:47 |
| 70.50.25.38 | attackspambots | fire |
2019-08-09 08:40:04 |
| 63.142.101.182 | attack | fire |
2019-08-09 08:53:10 |
| 36.156.24.95 | attackbots | fire |
2019-08-09 09:16:24 |
| 217.13.56.254 | attackbotsspam | Multiple failed RDP login attempts |
2019-08-09 09:19:05 |
| 64.222.246.86 | attack | fire |
2019-08-09 08:52:25 |
| 188.166.28.110 | attack | Aug 8 23:51:00 pornomens sshd\[5213\]: Invalid user redmine from 188.166.28.110 port 42618 Aug 8 23:51:00 pornomens sshd\[5213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.28.110 Aug 8 23:51:02 pornomens sshd\[5213\]: Failed password for invalid user redmine from 188.166.28.110 port 42618 ssh2 ... |
2019-08-09 09:03:33 |
| 185.176.27.18 | attackspam | firewall-block, port(s): 20706/tcp, 23206/tcp, 23506/tcp, 24206/tcp, 25306/tcp, 25606/tcp, 26006/tcp, 26306/tcp, 26406/tcp, 26706/tcp |
2019-08-09 09:00:54 |
| 36.156.24.94 | attackbots | fire |
2019-08-09 09:18:49 |
| 115.76.214.198 | attackbotsspam | Automatic report - Port Scan Attack |
2019-08-09 08:58:33 |