City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.214.107.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13562
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;92.214.107.95. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 13:45:20 CST 2025
;; MSG SIZE rcvd: 106
95.107.214.92.in-addr.arpa domain name pointer ipservice-092-214-107-095.092.214.pools.vodafone-ip.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
95.107.214.92.in-addr.arpa name = ipservice-092-214-107-095.092.214.pools.vodafone-ip.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 92.255.95.242 | attackspam | Nov 11 11:26:10 host sshd[6709]: User r.r from 92.255.95.242 not allowed because none of user's groups are listed in AllowGroups Nov 11 11:26:10 host sshd[6709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.95.242 user=r.r Nov 11 11:26:12 host sshd[6709]: Failed password for invalid user r.r from 92.255.95.242 port 45788 ssh2 Nov 11 11:26:12 host sshd[6709]: Received disconnect from 92.255.95.242 port 45788:11: Normal Shutdown, Thank you for playing [preauth] Nov 11 11:26:12 host sshd[6709]: Disconnected from invalid user r.r 92.255.95.242 port 45788 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=92.255.95.242 |
2019-11-12 19:43:12 |
| 42.231.131.9 | attackbots | Honeypot attack, port: 23, PTR: hn.kd.ny.adsl. |
2019-11-12 19:36:57 |
| 182.72.176.50 | attackbots | Honeypot attack, port: 445, PTR: nsg-static-050.176.72.182.airtel.in. |
2019-11-12 19:51:03 |
| 177.38.181.253 | attackspambots | Honeypot attack, port: 23, PTR: 177-38-181-253.micks.com.br. |
2019-11-12 19:42:49 |
| 107.77.225.139 | attackspam | Brainless IDIOT Website Spammer~ |
2019-11-12 19:10:30 |
| 201.101.4.249 | attackbots | Port scan |
2019-11-12 19:19:26 |
| 192.99.36.76 | attackbots | 2019-11-12T11:10:44.706105abusebot-7.cloudsearch.cf sshd\[22807\]: Invalid user marice from 192.99.36.76 port 51308 |
2019-11-12 19:33:26 |
| 129.204.52.150 | attackspambots | Nov 12 07:33:29 localhost sshd\[26780\]: Invalid user nyracai from 129.204.52.150 port 58410 Nov 12 07:33:29 localhost sshd\[26780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.52.150 Nov 12 07:33:31 localhost sshd\[26780\]: Failed password for invalid user nyracai from 129.204.52.150 port 58410 ssh2 Nov 12 07:38:20 localhost sshd\[26906\]: Invalid user catteryv from 129.204.52.150 port 39362 Nov 12 07:38:20 localhost sshd\[26906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.52.150 ... |
2019-11-12 19:34:15 |
| 5.196.118.54 | attackspam | 5.196.118.54 - - \[12/Nov/2019:11:34:58 +0100\] "POST /wp-login.php HTTP/1.0" 200 5507 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 5.196.118.54 - - \[12/Nov/2019:11:34:59 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 5.196.118.54 - - \[12/Nov/2019:11:35:00 +0100\] "POST /wp-login.php HTTP/1.0" 200 5494 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-11-12 19:19:54 |
| 129.204.50.75 | attackbots | Nov 11 21:31:35 php1 sshd\[30989\]: Invalid user guest from 129.204.50.75 Nov 11 21:31:35 php1 sshd\[30989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75 Nov 11 21:31:38 php1 sshd\[30989\]: Failed password for invalid user guest from 129.204.50.75 port 60890 ssh2 Nov 11 21:36:25 php1 sshd\[31419\]: Invalid user dwairiuko from 129.204.50.75 Nov 11 21:36:25 php1 sshd\[31419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75 |
2019-11-12 19:39:37 |
| 42.230.67.84 | attack | Honeypot attack, port: 23, PTR: hn.kd.ny.adsl. |
2019-11-12 19:45:07 |
| 101.85.192.230 | attackspam | Nov 12 12:11:59 master sshd[4841]: Failed password for invalid user galguften from 101.85.192.230 port 47241 ssh2 Nov 12 12:16:58 master sshd[4852]: Failed password for invalid user wheatley from 101.85.192.230 port 42059 ssh2 Nov 12 12:21:27 master sshd[4857]: Failed password for invalid user i from 101.85.192.230 port 59416 ssh2 Nov 12 12:27:05 master sshd[4859]: Failed password for invalid user visidh from 101.85.192.230 port 49717 ssh2 Nov 12 12:31:01 master sshd[5163]: Failed password for invalid user smmsp from 101.85.192.230 port 39596 ssh2 Nov 12 12:35:05 master sshd[5167]: Failed password for invalid user admin from 101.85.192.230 port 57748 ssh2 Nov 12 12:38:57 master sshd[5171]: Failed password for invalid user gelson from 101.85.192.230 port 47621 ssh2 Nov 12 12:43:07 master sshd[5173]: Failed password for invalid user juers from 101.85.192.230 port 37575 ssh2 |
2019-11-12 19:07:17 |
| 154.92.22.137 | attack | SSH invalid-user multiple login try |
2019-11-12 19:29:45 |
| 185.177.0.237 | attackbots | Nov 12 07:21:10 mxgate1 postfix/postscreen[24898]: CONNECT from [185.177.0.237]:54371 to [176.31.12.44]:25 Nov 12 07:21:10 mxgate1 postfix/dnsblog[24915]: addr 185.177.0.237 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 12 07:21:10 mxgate1 postfix/dnsblog[24917]: addr 185.177.0.237 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 12 07:21:10 mxgate1 postfix/dnsblog[24914]: addr 185.177.0.237 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Nov 12 07:21:10 mxgate1 postfix/dnsblog[24918]: addr 185.177.0.237 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 12 07:21:10 mxgate1 postfix/postscreen[24898]: PREGREET 22 after 0.15 from [185.177.0.237]:54371: EHLO [185.177.0.237] Nov 12 07:21:10 mxgate1 postfix/postscreen[24898]: DNSBL rank 5 for [185.177.0.237]:54371 Nov x@x Nov 12 07:21:10 mxgate1 postfix/postscreen[24898]: HANGUP after 0.56 from [185.177.0.237]:54371 in tests after SMTP handshake Nov 12 07:21:10 mxgate1 postfix/postscreen[24898]: DISCONNECT [18........ ------------------------------- |
2019-11-12 19:14:51 |
| 200.209.174.38 | attack | Nov 12 06:18:25 TORMINT sshd\[11405\]: Invalid user gherardo from 200.209.174.38 Nov 12 06:18:25 TORMINT sshd\[11405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.174.38 Nov 12 06:18:27 TORMINT sshd\[11405\]: Failed password for invalid user gherardo from 200.209.174.38 port 48585 ssh2 ... |
2019-11-12 19:36:21 |