City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.42.40.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2441
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.42.40.140. IN A
;; AUTHORITY SECTION:
. 493 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2021123000 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 30 16:03:47 CST 2021
;; MSG SIZE rcvd: 106
140.40.42.109.in-addr.arpa domain name pointer ip-109-42-40-140.web.vodafone.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.40.42.109.in-addr.arpa name = ip-109-42-40-140.web.vodafone.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
209.127.38.38 | attack | (From information@total-healthchiropractic.com) ATT: total-healthchiropractic.com / Total Health Chiropractic of Kalispell, Montana Official Website Chiropractor Dr. Richard Puchta offering Gentle Chiropractic Care. INTERNET SITE SOLUTIONS This notification ENDS ON: Sep 27, 2020 We have actually not obtained a payment from you. We've tried to call you but were unable to contact you. Kindly Visit: https://bit.ly/32XRmKa . For info and also to process a optional settlement for services. 09272020033352. |
2020-09-28 05:18:56 |
192.241.234.114 | attackspam | firewall-block, port(s): 26361/tcp |
2020-09-28 05:23:08 |
116.12.52.141 | attackspambots | Sep 27 16:01:28 plex-server sshd[3274667]: Failed password for invalid user ps from 116.12.52.141 port 52888 ssh2 Sep 27 16:05:42 plex-server sshd[3276482]: Invalid user target from 116.12.52.141 port 56053 Sep 27 16:05:42 plex-server sshd[3276482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.52.141 Sep 27 16:05:42 plex-server sshd[3276482]: Invalid user target from 116.12.52.141 port 56053 Sep 27 16:05:45 plex-server sshd[3276482]: Failed password for invalid user target from 116.12.52.141 port 56053 ssh2 ... |
2020-09-28 05:12:28 |
13.127.50.37 | attackspambots | Lines containing failures of 13.127.50.37 (max 1000) Sep 27 08:03:00 srv sshd[59890]: Invalid user www from 13.127.50.37 port 37436 Sep 27 08:03:00 srv sshd[59890]: Received disconnect from 13.127.50.37 port 37436:11: Bye Bye [preauth] Sep 27 08:03:00 srv sshd[59890]: Disconnected from invalid user www 13.127.50.37 port 37436 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=13.127.50.37 |
2020-09-28 05:35:16 |
170.150.8.1 | attackspam | $f2bV_matches |
2020-09-28 05:33:13 |
77.238.212.227 | attackspambots | 445/tcp [2020-09-26]1pkt |
2020-09-28 05:37:39 |
54.38.240.34 | attack | Sep 27 21:59:32 marvibiene sshd[5088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.240.34 Sep 27 21:59:34 marvibiene sshd[5088]: Failed password for invalid user ts from 54.38.240.34 port 36384 ssh2 Sep 27 22:10:19 marvibiene sshd[5762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.240.34 |
2020-09-28 05:19:44 |
199.34.83.51 | attackspambots | Port Scan: TCP/443 |
2020-09-28 05:42:13 |
222.76.126.213 | attackspam | 1433/tcp [2020-09-26]1pkt |
2020-09-28 05:35:37 |
178.62.69.110 | attackspambots | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-09-28 05:09:11 |
139.198.177.151 | attack | Sep 27 20:11:32 email sshd\[11271\]: Invalid user bbb from 139.198.177.151 Sep 27 20:11:32 email sshd\[11271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.177.151 Sep 27 20:11:34 email sshd\[11271\]: Failed password for invalid user bbb from 139.198.177.151 port 59398 ssh2 Sep 27 20:15:11 email sshd\[12023\]: Invalid user low from 139.198.177.151 Sep 27 20:15:11 email sshd\[12023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.177.151 ... |
2020-09-28 05:41:26 |
78.47.171.125 | attack | (sshd) Failed SSH login from 78.47.171.125 (DE/Germany/static.125.171.47.78.clients.your-server.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 27 01:43:23 optimus sshd[25207]: Invalid user william from 78.47.171.125 Sep 27 01:43:25 optimus sshd[25207]: Failed password for invalid user william from 78.47.171.125 port 36138 ssh2 Sep 27 01:57:47 optimus sshd[29775]: Invalid user lisa from 78.47.171.125 Sep 27 01:57:49 optimus sshd[29775]: Failed password for invalid user lisa from 78.47.171.125 port 45360 ssh2 Sep 27 02:01:29 optimus sshd[31308]: Invalid user kim from 78.47.171.125 |
2020-09-28 05:39:38 |
218.92.0.145 | attack | Sep 27 21:24:14 game-panel sshd[13827]: Failed password for root from 218.92.0.145 port 11228 ssh2 Sep 27 21:24:17 game-panel sshd[13827]: Failed password for root from 218.92.0.145 port 11228 ssh2 Sep 27 21:24:27 game-panel sshd[13827]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 11228 ssh2 [preauth] |
2020-09-28 05:27:46 |
114.32.162.178 | attackspambots | 1601195876 - 09/27/2020 10:37:56 Host: 114.32.162.178/114.32.162.178 Port: 23 TCP Blocked |
2020-09-28 05:15:01 |
88.17.240.63 | attackspam | Sep 27 20:38:30 abendstille sshd\[27717\]: Invalid user ftp_id from 88.17.240.63 Sep 27 20:38:30 abendstille sshd\[27717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.17.240.63 Sep 27 20:38:32 abendstille sshd\[27717\]: Failed password for invalid user ftp_id from 88.17.240.63 port 56454 ssh2 Sep 27 20:42:02 abendstille sshd\[31413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.17.240.63 user=root Sep 27 20:42:05 abendstille sshd\[31413\]: Failed password for root from 88.17.240.63 port 59849 ssh2 ... |
2020-09-28 05:22:09 |