City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.208.160.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.208.160.40.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:57:24 CST 2025
;; MSG SIZE  rcvd: 107
        40.160.208.139.in-addr.arpa domain name pointer 40.160.208.139.adsl-pool.jlccptt.net.cn.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
40.160.208.139.in-addr.arpa	name = 40.160.208.139.adsl-pool.jlccptt.net.cn.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 216.245.209.230 | attack | 
  | 
                    2020-10-01 23:26:20 | 
| 35.207.118.23 | attackspam | timhelmke.de 35.207.118.23 [01/Oct/2020:13:20:02 +0200] "POST /wp-login.php HTTP/1.1" 200 6650 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" timhelmke.de 35.207.118.23 [01/Oct/2020:13:20:03 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4050 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2020-10-01 23:30:21 | 
| 66.41.236.80 | attackbotsspam | [f2b] sshd bruteforce, retries: 1  | 
                    2020-10-01 22:59:17 | 
| 59.56.71.215 | attackspam | Port Scan ...  | 
                    2020-10-01 23:06:34 | 
| 71.117.128.50 | attackbotsspam | Invalid user workshop from 71.117.128.50 port 46684  | 
                    2020-10-01 23:19:36 | 
| 178.218.228.223 | attackspam | Sep 30 22:39:13 ns381471 sshd[19507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.218.228.223 Sep 30 22:39:16 ns381471 sshd[19507]: Failed password for invalid user avanthi from 178.218.228.223 port 9717 ssh2  | 
                    2020-10-01 22:56:11 | 
| 193.248.191.48 | attack | Port scan on 1 port(s): 445  | 
                    2020-10-01 22:59:02 | 
| 173.242.115.171 | attackspam | Oct 1 13:22:42 rancher-0 sshd[401279]: Invalid user test1 from 173.242.115.171 port 42662 ...  | 
                    2020-10-01 22:54:40 | 
| 177.124.201.61 | attack | (sshd) Failed SSH login from 177.124.201.61 (BR/Brazil/mvx-177-124-201-61.mundivox.com): 12 in the last 3600 secs  | 
                    2020-10-01 23:00:44 | 
| 45.142.120.38 | attackbotsspam | Oct 1 16:58:17 web01.agentur-b-2.de postfix/smtpd[3707889]: warning: unknown[45.142.120.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 1 16:58:22 web01.agentur-b-2.de postfix/smtpd[3706463]: warning: unknown[45.142.120.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 1 16:58:26 web01.agentur-b-2.de postfix/smtpd[3701233]: warning: unknown[45.142.120.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 1 16:58:32 web01.agentur-b-2.de postfix/smtpd[3703233]: warning: unknown[45.142.120.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 1 16:58:35 web01.agentur-b-2.de postfix/smtpd[3707889]: warning: unknown[45.142.120.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6  | 
                    2020-10-01 23:22:28 | 
| 64.202.187.246 | attack | Invalid user user from 64.202.187.246 port 57606  | 
                    2020-10-01 23:23:22 | 
| 192.35.169.59 | attackspambots | trying to access non-authorized port  | 
                    2020-10-01 23:24:11 | 
| 49.234.43.224 | attackspam | Connection to SSH Honeypot - Detected by HoneypotDB  | 
                    2020-10-01 22:54:54 | 
| 176.99.163.138 | attack | law-Joomla User : try to access forms...  | 
                    2020-10-01 23:22:55 | 
| 93.39.116.254 | attack | Oct 1 14:14:20 sshgateway sshd\[14532\]: Invalid user bootcamp from 93.39.116.254 Oct 1 14:14:20 sshgateway sshd\[14532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-39-116-254.ip75.fastwebnet.it Oct 1 14:14:22 sshgateway sshd\[14532\]: Failed password for invalid user bootcamp from 93.39.116.254 port 51898 ssh2  | 
                    2020-10-01 23:26:02 |