City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.40.148.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.40.148.64. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 16:48:42 CST 2025
;; MSG SIZE rcvd: 104
64.148.40.2.in-addr.arpa domain name pointer net-2-40-148-64.cust.vodafonedsl.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
64.148.40.2.in-addr.arpa name = net-2-40-148-64.cust.vodafonedsl.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 147.135.133.29 | attackspam | Oct 22 15:07:14 tuxlinux sshd[41972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.133.29 user=root Oct 22 15:07:16 tuxlinux sshd[41972]: Failed password for root from 147.135.133.29 port 56702 ssh2 Oct 22 15:07:14 tuxlinux sshd[41972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.133.29 user=root Oct 22 15:07:16 tuxlinux sshd[41972]: Failed password for root from 147.135.133.29 port 56702 ssh2 Oct 22 15:14:09 tuxlinux sshd[42146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.133.29 user=root ... |
2019-10-22 22:20:53 |
| 60.168.128.2 | attackspambots | Oct 22 15:34:40 tuxlinux sshd[42449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.168.128.2 user=root Oct 22 15:34:42 tuxlinux sshd[42449]: Failed password for root from 60.168.128.2 port 38756 ssh2 Oct 22 15:34:40 tuxlinux sshd[42449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.168.128.2 user=root Oct 22 15:34:42 tuxlinux sshd[42449]: Failed password for root from 60.168.128.2 port 38756 ssh2 Oct 22 16:00:21 tuxlinux sshd[42884]: Invalid user umountfs from 60.168.128.2 port 54514 ... |
2019-10-22 22:36:38 |
| 140.143.196.247 | attackbots | Oct 22 15:36:34 markkoudstaal sshd[13634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.196.247 Oct 22 15:36:36 markkoudstaal sshd[13634]: Failed password for invalid user userftp from 140.143.196.247 port 54406 ssh2 Oct 22 15:42:03 markkoudstaal sshd[14223]: Failed password for root from 140.143.196.247 port 33380 ssh2 |
2019-10-22 21:55:11 |
| 200.111.102.27 | attack | Fail2Ban Ban Triggered |
2019-10-22 22:18:36 |
| 193.112.97.157 | attack | 2019-10-22T14:07:56.247649abusebot-4.cloudsearch.cf sshd\[26293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.97.157 user=root |
2019-10-22 22:34:24 |
| 223.240.84.196 | attackbots | Oct 22 16:14:37 lnxweb61 sshd[29143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.84.196 Oct 22 16:14:39 lnxweb61 sshd[29143]: Failed password for invalid user dvr from 223.240.84.196 port 58536 ssh2 Oct 22 16:20:53 lnxweb61 sshd[2880]: Failed password for root from 223.240.84.196 port 37468 ssh2 |
2019-10-22 22:23:58 |
| 223.171.32.55 | attackspambots | Oct 22 03:50:17 web9 sshd\[28468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55 user=root Oct 22 03:50:19 web9 sshd\[28468\]: Failed password for root from 223.171.32.55 port 14658 ssh2 Oct 22 03:54:48 web9 sshd\[29068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55 user=root Oct 22 03:54:49 web9 sshd\[29068\]: Failed password for root from 223.171.32.55 port 14658 ssh2 Oct 22 03:59:13 web9 sshd\[29645\]: Invalid user suporte from 223.171.32.55 |
2019-10-22 22:03:14 |
| 218.92.0.211 | attackspambots | Oct 22 16:08:08 eventyay sshd[10473]: Failed password for root from 218.92.0.211 port 47852 ssh2 Oct 22 16:08:39 eventyay sshd[10487]: Failed password for root from 218.92.0.211 port 60753 ssh2 ... |
2019-10-22 22:30:21 |
| 79.137.86.43 | attackbotsspam | Oct 22 19:09:19 areeb-Workstation sshd[620]: Failed password for root from 79.137.86.43 port 35114 ssh2 ... |
2019-10-22 21:59:39 |
| 139.99.121.6 | attackbotsspam | Automatic report - XMLRPC Attack |
2019-10-22 22:11:27 |
| 115.231.126.19 | attackspambots | 3389BruteforceFW21 |
2019-10-22 22:27:19 |
| 157.119.107.120 | attack | port scan and connect, tcp 22 (ssh) |
2019-10-22 22:00:14 |
| 111.12.52.239 | attack | Oct 22 15:56:17 MK-Soft-VM4 sshd[28490]: Failed password for root from 111.12.52.239 port 36546 ssh2 ... |
2019-10-22 22:19:33 |
| 159.65.241.216 | attackspam | 10/22/2019-09:21:38.521623 159.65.241.216 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-22 22:07:28 |
| 112.216.39.29 | attackspam | Oct 22 11:50:58 thevastnessof sshd[22958]: Failed password for root from 112.216.39.29 port 48696 ssh2 ... |
2019-10-22 22:03:43 |