City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.158.139.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42544
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.158.139.60. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 18:41:30 CST 2025
;; MSG SIZE rcvd: 105
60.139.158.5.in-addr.arpa domain name pointer ip-005-158-139-060.um07.pools.vodafone-ip.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
60.139.158.5.in-addr.arpa name = ip-005-158-139-060.um07.pools.vodafone-ip.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
192.35.169.33 | attackbots |
|
2020-10-03 22:54:37 |
95.85.34.53 | attack | k+ssh-bruteforce |
2020-10-03 22:39:27 |
89.248.168.220 | attackspambots | firewall-block, port(s): 20481/tcp |
2020-10-03 22:54:10 |
27.254.130.67 | attack | Oct 3 15:39:53 lavrea sshd[146444]: Invalid user discord from 27.254.130.67 port 40462 ... |
2020-10-03 22:55:49 |
51.79.55.141 | attackbots | Invalid user phion from 51.79.55.141 port 55282 |
2020-10-03 22:41:43 |
128.199.99.204 | attack | 2020-10-03T13:32:46.970882abusebot-7.cloudsearch.cf sshd[6721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.99.204 user=root 2020-10-03T13:32:49.066237abusebot-7.cloudsearch.cf sshd[6721]: Failed password for root from 128.199.99.204 port 52915 ssh2 2020-10-03T13:37:59.524933abusebot-7.cloudsearch.cf sshd[6725]: Invalid user joe from 128.199.99.204 port 48688 2020-10-03T13:37:59.536259abusebot-7.cloudsearch.cf sshd[6725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.99.204 2020-10-03T13:37:59.524933abusebot-7.cloudsearch.cf sshd[6725]: Invalid user joe from 128.199.99.204 port 48688 2020-10-03T13:38:01.265500abusebot-7.cloudsearch.cf sshd[6725]: Failed password for invalid user joe from 128.199.99.204 port 48688 ssh2 2020-10-03T13:39:18.924279abusebot-7.cloudsearch.cf sshd[6727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.99.204 u ... |
2020-10-03 22:51:03 |
42.178.89.71 | attackspam | Port probing on unauthorized port 23 |
2020-10-03 22:43:48 |
112.85.42.187 | attackbots | Oct 3 16:27:30 ns381471 sshd[25371]: Failed password for root from 112.85.42.187 port 12538 ssh2 Oct 3 16:27:33 ns381471 sshd[25371]: Failed password for root from 112.85.42.187 port 12538 ssh2 |
2020-10-03 22:44:51 |
192.35.169.29 | attackspam |
|
2020-10-03 22:19:44 |
64.227.19.127 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 5802 resulting in total of 3 scans from 64.227.0.0/17 block. |
2020-10-03 22:12:02 |
46.217.139.137 | attackbotsspam | srvr3: (mod_security) mod_security (id:920350) triggered by 46.217.139.137 (MK/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/10/02 22:39:57 [error] 70998#0: *410 [client 46.217.139.137] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host' [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "160167119767.124272"] [ref "o0,14v21,14"], client: 46.217.139.137, [redacted] request: "GET / HTTP/1.1" [redacted] |
2020-10-03 22:13:43 |
192.35.169.17 | attackspambots |
|
2020-10-03 22:31:48 |
195.14.170.50 | attackspam | TCP port : 10937 |
2020-10-03 22:23:27 |
111.229.254.17 | attack | Invalid user scaner from 111.229.254.17 port 43890 |
2020-10-03 22:53:35 |
104.248.114.67 | attackspambots | 20 attempts against mh-ssh on cloud |
2020-10-03 22:22:23 |