City: unknown
Region: unknown
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.78.100.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.78.100.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 02:24:16 CST 2025
;; MSG SIZE rcvd: 106
66.100.78.140.in-addr.arpa domain name pointer dns1e.ins.jku.at.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.100.78.140.in-addr.arpa name = dns1e.ins.jku.at.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 173.240.248.38 | attack | proto=tcp . spt=58396 . dpt=25 . (listed on Blocklist de Sep 16) (658) |
2019-09-17 23:38:43 |
| 190.223.26.38 | attack | Sep 17 17:45:05 yabzik sshd[20790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.223.26.38 Sep 17 17:45:06 yabzik sshd[20790]: Failed password for invalid user rootpass from 190.223.26.38 port 29815 ssh2 Sep 17 17:50:24 yabzik sshd[23132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.223.26.38 |
2019-09-17 22:54:37 |
| 50.73.204.10 | attackbotsspam | 19/9/17@09:34:24: FAIL: Alarm-Intrusion address from=50.73.204.10 ... |
2019-09-17 23:31:33 |
| 116.52.20.193 | attackspam | Sep 17 17:00:27 srv206 sshd[7137]: Invalid user admin from 116.52.20.193 Sep 17 17:00:27 srv206 sshd[7137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.52.20.193 Sep 17 17:00:27 srv206 sshd[7137]: Invalid user admin from 116.52.20.193 Sep 17 17:00:29 srv206 sshd[7137]: Failed password for invalid user admin from 116.52.20.193 port 37206 ssh2 ... |
2019-09-18 00:08:02 |
| 159.203.197.155 | attack | proto=tcp . spt=45917 . dpt=3389 . src=159.203.197.155 . dst=xx.xx.4.1 . (listed on rbldns-ru) (655) |
2019-09-17 23:54:09 |
| 106.75.216.98 | attackspam | Sep 17 16:44:25 eventyay sshd[24627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.216.98 Sep 17 16:44:27 eventyay sshd[24627]: Failed password for invalid user rcmoharana from 106.75.216.98 port 46528 ssh2 Sep 17 16:50:54 eventyay sshd[24688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.216.98 ... |
2019-09-17 23:02:35 |
| 173.220.206.162 | attackspambots | Sep 17 17:56:38 MK-Soft-Root2 sshd\[32689\]: Invalid user guest from 173.220.206.162 port 38397 Sep 17 17:56:38 MK-Soft-Root2 sshd\[32689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.220.206.162 Sep 17 17:56:40 MK-Soft-Root2 sshd\[32689\]: Failed password for invalid user guest from 173.220.206.162 port 38397 ssh2 ... |
2019-09-18 00:04:51 |
| 110.77.136.66 | attackbots | Fail2Ban - SSH Bruteforce Attempt |
2019-09-17 23:34:09 |
| 42.58.207.210 | attackbotsspam | Sep 17 20:33:38 lcl-usvr-02 sshd[23462]: Invalid user admin from 42.58.207.210 port 48319 Sep 17 20:33:38 lcl-usvr-02 sshd[23462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.58.207.210 Sep 17 20:33:38 lcl-usvr-02 sshd[23462]: Invalid user admin from 42.58.207.210 port 48319 Sep 17 20:33:40 lcl-usvr-02 sshd[23462]: Failed password for invalid user admin from 42.58.207.210 port 48319 ssh2 Sep 17 20:33:38 lcl-usvr-02 sshd[23462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.58.207.210 Sep 17 20:33:38 lcl-usvr-02 sshd[23462]: Invalid user admin from 42.58.207.210 port 48319 Sep 17 20:33:40 lcl-usvr-02 sshd[23462]: Failed password for invalid user admin from 42.58.207.210 port 48319 ssh2 Sep 17 20:33:43 lcl-usvr-02 sshd[23462]: Failed password for invalid user admin from 42.58.207.210 port 48319 ssh2 ... |
2019-09-18 00:10:15 |
| 167.71.41.110 | attackbots | Sep 17 17:26:35 mail sshd\[7166\]: Failed password for invalid user esau from 167.71.41.110 port 43438 ssh2 Sep 17 17:31:03 mail sshd\[7800\]: Invalid user yura from 167.71.41.110 port 33492 Sep 17 17:31:03 mail sshd\[7800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.41.110 Sep 17 17:31:05 mail sshd\[7800\]: Failed password for invalid user yura from 167.71.41.110 port 33492 ssh2 Sep 17 17:35:26 mail sshd\[8394\]: Invalid user peter from 167.71.41.110 port 52068 |
2019-09-17 23:59:30 |
| 139.199.158.14 | attackspam | Sep 17 04:23:10 hpm sshd\[8323\]: Invalid user cdvonline from 139.199.158.14 Sep 17 04:23:10 hpm sshd\[8323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.158.14 Sep 17 04:23:12 hpm sshd\[8323\]: Failed password for invalid user cdvonline from 139.199.158.14 port 36153 ssh2 Sep 17 04:27:39 hpm sshd\[8722\]: Invalid user yale from 139.199.158.14 Sep 17 04:27:39 hpm sshd\[8722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.158.14 |
2019-09-17 22:41:06 |
| 222.186.15.160 | attackspambots | Sep 17 11:03:23 TORMINT sshd\[548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.160 user=root Sep 17 11:03:25 TORMINT sshd\[548\]: Failed password for root from 222.186.15.160 port 12004 ssh2 Sep 17 11:03:27 TORMINT sshd\[548\]: Failed password for root from 222.186.15.160 port 12004 ssh2 ... |
2019-09-17 23:13:58 |
| 117.48.208.71 | attack | Sep 17 14:45:34 hcbbdb sshd\[4997\]: Invalid user Findlay from 117.48.208.71 Sep 17 14:45:34 hcbbdb sshd\[4997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.208.71 Sep 17 14:45:37 hcbbdb sshd\[4997\]: Failed password for invalid user Findlay from 117.48.208.71 port 56634 ssh2 Sep 17 14:52:23 hcbbdb sshd\[5779\]: Invalid user 1234 from 117.48.208.71 Sep 17 14:52:24 hcbbdb sshd\[5779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.208.71 |
2019-09-17 23:07:36 |
| 164.132.44.25 | attack | Sep 17 05:16:00 friendsofhawaii sshd\[27166\]: Invalid user user from 164.132.44.25 Sep 17 05:16:00 friendsofhawaii sshd\[27166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu Sep 17 05:16:03 friendsofhawaii sshd\[27166\]: Failed password for invalid user user from 164.132.44.25 port 32852 ssh2 Sep 17 05:20:37 friendsofhawaii sshd\[27563\]: Invalid user user from 164.132.44.25 Sep 17 05:20:37 friendsofhawaii sshd\[27563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu |
2019-09-17 23:21:05 |
| 202.144.157.70 | attackbots | Sep 17 18:31:39 server sshd\[19163\]: Invalid user mika from 202.144.157.70 port 19239 Sep 17 18:31:39 server sshd\[19163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.144.157.70 Sep 17 18:31:40 server sshd\[19163\]: Failed password for invalid user mika from 202.144.157.70 port 19239 ssh2 Sep 17 18:36:48 server sshd\[31046\]: Invalid user ts3server from 202.144.157.70 port 28844 Sep 17 18:36:48 server sshd\[31046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.144.157.70 |
2019-09-17 23:48:14 |