City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.134.39.193 | attackbots | Aug 11 14:05:35 web1 sshd\[12861\]: Invalid user pi from 94.134.39.193 Aug 11 14:05:35 web1 sshd\[12863\]: Invalid user pi from 94.134.39.193 Aug 11 14:05:35 web1 sshd\[12863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.134.39.193 Aug 11 14:05:35 web1 sshd\[12861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.134.39.193 Aug 11 14:05:38 web1 sshd\[12863\]: Failed password for invalid user pi from 94.134.39.193 port 50924 ssh2 |
2020-08-12 03:10:03 |
| 94.134.35.181 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-05 08:50:18 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.134.3.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.134.3.9. IN A
;; AUTHORITY SECTION:
. 443 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 18:35:25 CST 2022
;; MSG SIZE rcvd: 103
9.3.134.94.in-addr.arpa domain name pointer i5E860309.versanet.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
9.3.134.94.in-addr.arpa name = i5E860309.versanet.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.25.95.38 | attack | Unauthorized connection attempt from IP address 94.25.95.38 on Port 445(SMB) |
2020-04-08 03:31:02 |
| 114.188.74.49 | attackspambots | Attempted connection to port 1433. |
2020-04-08 03:56:54 |
| 117.3.61.194 | attack | Unauthorized connection attempt from IP address 117.3.61.194 on Port 445(SMB) |
2020-04-08 03:57:54 |
| 167.71.218.147 | attackspambots | DATE:2020-04-07 18:14:35, IP:167.71.218.147, PORT:ssh SSH brute force auth (docker-dc) |
2020-04-08 03:55:53 |
| 113.189.212.53 | attack | Attempted connection to port 445. |
2020-04-08 03:58:20 |
| 176.32.129.234 | attackbots | Unauthorized connection attempt from IP address 176.32.129.234 on Port 445(SMB) |
2020-04-08 03:34:16 |
| 175.6.62.8 | attackspambots | sshd jail - ssh hack attempt |
2020-04-08 03:50:00 |
| 104.244.78.233 | attack | Automatic report - Banned IP Access |
2020-04-08 03:33:44 |
| 118.70.67.233 | attack | Unauthorized connection attempt from IP address 118.70.67.233 on Port 445(SMB) |
2020-04-08 03:32:50 |
| 51.91.140.218 | attackspambots | Apr 7 21:09:52 lock-38 sshd[709200]: Unable to negotiate with 51.91.140.218 port 60764: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 7 21:10:30 lock-38 sshd[709238]: Unable to negotiate with 51.91.140.218 port 38092: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 7 21:11:08 lock-38 sshd[709260]: Unable to negotiate with 51.91.140.218 port 43912: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 7 21:11:46 lock-38 sshd[709263]: Unable to negotiate with 51.91.140.218 port 49634: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 7 21:12:22 lock-38 sshd[709284] ... |
2020-04-08 03:36:32 |
| 58.56.96.27 | attackspambots | Unauthorized connection attempt from IP address 58.56.96.27 on Port 445(SMB) |
2020-04-08 04:02:54 |
| 220.167.100.60 | attackspambots | Apr 7 18:05:02 ns382633 sshd\[15619\]: Invalid user test from 220.167.100.60 port 40214 Apr 7 18:05:02 ns382633 sshd\[15619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.167.100.60 Apr 7 18:05:05 ns382633 sshd\[15619\]: Failed password for invalid user test from 220.167.100.60 port 40214 ssh2 Apr 7 18:08:04 ns382633 sshd\[16437\]: Invalid user oracle4 from 220.167.100.60 port 60204 Apr 7 18:08:04 ns382633 sshd\[16437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.167.100.60 |
2020-04-08 03:30:02 |
| 77.222.96.249 | attackspam | 20/4/7@08:45:49: FAIL: Alarm-Network address from=77.222.96.249 ... |
2020-04-08 03:50:21 |
| 104.41.224.228 | attackspam | Microsoft-Windows-Security-Auditing |
2020-04-08 03:59:57 |
| 113.163.202.41 | attackbots | Unauthorized connection attempt from IP address 113.163.202.41 on Port 445(SMB) |
2020-04-08 03:42:14 |