City: unknown
Region: unknown
Country: Netherlands (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.53.239.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57190
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.53.239.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 15:58:10 CST 2025
;; MSG SIZE rcvd: 107
140.239.53.145.in-addr.arpa domain name pointer 145-53-239-140.fixed.kpn.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.239.53.145.in-addr.arpa name = 145-53-239-140.fixed.kpn.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.99.113.17 | attackspam | Port Scan detected! ... |
2020-06-22 20:15:40 |
| 49.233.80.135 | attackbots | Jun 22 12:04:54 game-panel sshd[28252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.80.135 Jun 22 12:04:56 game-panel sshd[28252]: Failed password for invalid user gian from 49.233.80.135 port 45740 ssh2 Jun 22 12:08:13 game-panel sshd[28489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.80.135 |
2020-06-22 20:19:29 |
| 161.35.30.56 | attackspambots |
|
2020-06-22 19:58:48 |
| 113.161.220.158 | attackspam | Unauthorized IMAP connection attempt |
2020-06-22 19:55:03 |
| 118.24.140.195 | attack | 21 attempts against mh-ssh on echoip |
2020-06-22 20:02:36 |
| 106.54.145.68 | attack | SSH Honeypot -> SSH Bruteforce / Login |
2020-06-22 20:10:47 |
| 180.242.213.151 | spambotsattackproxynormal | Jjjjnnnn |
2020-06-22 20:31:57 |
| 69.94.157.141 | attackbots | Spam |
2020-06-22 20:04:27 |
| 192.35.168.109 | attackspam |
|
2020-06-22 20:03:14 |
| 197.45.110.217 | attackbots | Honeypot attack, port: 445, PTR: host-197.45.110.217.tedata.net. |
2020-06-22 20:29:43 |
| 162.62.19.137 | attackspambots | 4506/tcp 631/tcp 9864/tcp... [2020-05-07/06-22]6pkt,5pt.(tcp),1pt.(udp) |
2020-06-22 20:07:04 |
| 117.30.236.35 | attack | Jun 22 13:49:40 dev0-dcde-rnet sshd[6375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.30.236.35 Jun 22 13:49:42 dev0-dcde-rnet sshd[6375]: Failed password for invalid user oneadmin from 117.30.236.35 port 12991 ssh2 Jun 22 14:08:10 dev0-dcde-rnet sshd[6707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.30.236.35 |
2020-06-22 20:22:06 |
| 115.75.3.200 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-06-22 20:25:13 |
| 190.151.37.20 | attack | Fail2Ban - SSH Bruteforce Attempt |
2020-06-22 20:02:08 |
| 94.72.101.76 | attackspambots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-06-22 20:31:37 |