City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.40.11.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.40.11.116.			IN	A
;; AUTHORITY SECTION:
.			164	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:32:13 CST 2022
;; MSG SIZE  rcvd: 104116.11.40.2.in-addr.arpa domain name pointer net-2-40-11-116.cust.vodafonedsl.it.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
116.11.40.2.in-addr.arpa	name = net-2-40-11-116.cust.vodafonedsl.it.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 72.38.244.195 | attack | POP | 2019-11-11 22:46:03 | 
| 31.46.91.183 | attackspam | TCP Port Scanning | 2019-11-11 23:01:48 | 
| 117.1.98.174 | attack | Unauthorized connection attempt from IP address 117.1.98.174 on Port 445(SMB) | 2019-11-11 23:00:20 | 
| 49.151.235.8 | attack | Unauthorized connection attempt from IP address 49.151.235.8 on Port 445(SMB) | 2019-11-11 22:48:10 | 
| 115.79.37.205 | attack | Unauthorized connection attempt from IP address 115.79.37.205 on Port 445(SMB) | 2019-11-11 23:17:02 | 
| 217.76.40.82 | attackbotsspam | Failed password for backup from 217.76.40.82 port 43099 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.76.40.82 user=root Failed password for root from 217.76.40.82 port 33527 ssh2 Invalid user perland from 217.76.40.82 port 52192 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.76.40.82 | 2019-11-11 22:55:45 | 
| 206.180.107.2 | attackspam | Unauthorized connection attempt from IP address 206.180.107.2 on Port 445(SMB) | 2019-11-11 22:53:21 | 
| 221.148.45.168 | attackbots | detected by Fail2Ban | 2019-11-11 23:04:45 | 
| 1.179.146.156 | attackspambots | Nov 11 10:06:48 sd-53420 sshd\[28976\]: Invalid user admina from 1.179.146.156 Nov 11 10:06:48 sd-53420 sshd\[28976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.146.156 Nov 11 10:06:50 sd-53420 sshd\[28976\]: Failed password for invalid user admina from 1.179.146.156 port 52642 ssh2 Nov 11 10:11:13 sd-53420 sshd\[30255\]: User root from 1.179.146.156 not allowed because none of user's groups are listed in AllowGroups Nov 11 10:11:13 sd-53420 sshd\[30255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.146.156 user=root ... | 2019-11-11 22:39:09 | 
| 118.238.4.201 | attackspam | www.geburtshaus-fulda.de 118.238.4.201 \[11/Nov/2019:14:26:26 +0100\] "POST /wp-login.php HTTP/1.1" 200 5785 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" www.geburtshaus-fulda.de 118.238.4.201 \[11/Nov/2019:14:26:29 +0100\] "POST /wp-login.php HTTP/1.1" 200 5789 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" | 2019-11-11 22:45:15 | 
| 78.154.187.134 | attack | Automatic report - Banned IP Access | 2019-11-11 23:09:30 | 
| 222.74.50.141 | attackspam | /TP/public/index.php | 2019-11-11 22:51:50 | 
| 122.176.44.163 | attackspambots | Nov 11 12:41:10 vpn01 sshd[17079]: Failed password for root from 122.176.44.163 port 47574 ssh2 ... | 2019-11-11 22:35:16 | 
| 185.32.47.254 | attack | Unauthorized connection attempt from IP address 185.32.47.254 on Port 445(SMB) | 2019-11-11 23:04:05 | 
| 186.6.189.110 | attackspam | Unauthorized connection attempt from IP address 186.6.189.110 on Port 445(SMB) | 2019-11-11 23:15:14 |