City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.133.40.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.133.40.74. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 16:06:41 CST 2025
;; MSG SIZE rcvd: 105
74.40.133.80.in-addr.arpa domain name pointer p5085284a.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
74.40.133.80.in-addr.arpa name = p5085284a.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.207.2.130 | attackspam | Honeypot attack, port: 445, PTR: 190-207-2-130.dyn.dsl.cantv.net. |
2020-09-17 09:11:53 |
| 45.4.168.53 | attackbots | Sep 16 18:06:31 mail.srvfarm.net postfix/smtps/smtpd[3584335]: warning: unknown[45.4.168.53]: SASL PLAIN authentication failed: Sep 16 18:06:32 mail.srvfarm.net postfix/smtps/smtpd[3584335]: lost connection after AUTH from unknown[45.4.168.53] Sep 16 18:15:47 mail.srvfarm.net postfix/smtps/smtpd[3580300]: warning: unknown[45.4.168.53]: SASL PLAIN authentication failed: Sep 16 18:15:47 mail.srvfarm.net postfix/smtps/smtpd[3580300]: lost connection after AUTH from unknown[45.4.168.53] Sep 16 18:16:05 mail.srvfarm.net postfix/smtps/smtpd[3600011]: warning: unknown[45.4.168.53]: SASL PLAIN authentication failed: |
2020-09-17 09:09:57 |
| 216.104.200.22 | attackspam | s2.hscode.pl - SSH Attack |
2020-09-17 09:31:43 |
| 122.117.137.47 | attack | Honeypot attack, port: 5555, PTR: 122-117-137-47.HINET-IP.hinet.net. |
2020-09-17 09:34:33 |
| 114.199.231.15 | attack | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-09-17 09:19:16 |
| 141.98.80.188 | attackbots | 2020-09-17 02:39:55 dovecot_login authenticator failed for \(\[141.98.80.188\]\) \[141.98.80.188\]: 535 Incorrect authentication data \(set_id=ller@jugend-ohne-grenzen.net\) 2020-09-17 02:40:02 dovecot_login authenticator failed for \(\[141.98.80.188\]\) \[141.98.80.188\]: 535 Incorrect authentication data 2020-09-17 02:40:11 dovecot_login authenticator failed for \(\[141.98.80.188\]\) \[141.98.80.188\]: 535 Incorrect authentication data 2020-09-17 02:40:16 dovecot_login authenticator failed for \(\[141.98.80.188\]\) \[141.98.80.188\]: 535 Incorrect authentication data 2020-09-17 02:40:28 dovecot_login authenticator failed for \(\[141.98.80.188\]\) \[141.98.80.188\]: 535 Incorrect authentication data 2020-09-17 02:40:33 dovecot_login authenticator failed for \(\[141.98.80.188\]\) \[141.98.80.188\]: 535 Incorrect authentication data 2020-09-17 02:40:38 dovecot_login authenticator failed for \(\[141.98.80.188\]\) \[141.98.80.188\]: 535 Incorrect authentication data 2020-09-17 02:40:38 do ... |
2020-09-17 08:42:32 |
| 116.75.80.201 | attackbots | 20/9/16@12:58:08: FAIL: Alarm-Telnet address from=116.75.80.201 ... |
2020-09-17 09:37:26 |
| 162.142.125.21 | attack | Sep 16 14:19:24 : SSH login attempts with invalid user |
2020-09-17 09:14:18 |
| 177.154.238.126 | attackspam | Sep 16 18:49:42 mail.srvfarm.net postfix/smtpd[3601766]: warning: unknown[177.154.238.126]: SASL PLAIN authentication failed: Sep 16 18:49:42 mail.srvfarm.net postfix/smtpd[3601766]: lost connection after AUTH from unknown[177.154.238.126] Sep 16 18:50:00 mail.srvfarm.net postfix/smtps/smtpd[3603057]: warning: unknown[177.154.238.126]: SASL PLAIN authentication failed: Sep 16 18:50:00 mail.srvfarm.net postfix/smtps/smtpd[3603057]: lost connection after AUTH from unknown[177.154.238.126] Sep 16 18:54:18 mail.srvfarm.net postfix/smtpd[3603351]: warning: unknown[177.154.238.126]: SASL PLAIN authentication failed: |
2020-09-17 08:41:11 |
| 218.92.0.203 | attack | 2020-09-16T20:20:13.805864xentho-1 sshd[782969]: Failed password for root from 218.92.0.203 port 30474 ssh2 2020-09-16T20:20:11.292959xentho-1 sshd[782969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203 user=root 2020-09-16T20:20:13.805864xentho-1 sshd[782969]: Failed password for root from 218.92.0.203 port 30474 ssh2 2020-09-16T20:20:16.613417xentho-1 sshd[782969]: Failed password for root from 218.92.0.203 port 30474 ssh2 2020-09-16T20:20:11.292959xentho-1 sshd[782969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203 user=root 2020-09-16T20:20:13.805864xentho-1 sshd[782969]: Failed password for root from 218.92.0.203 port 30474 ssh2 2020-09-16T20:20:16.613417xentho-1 sshd[782969]: Failed password for root from 218.92.0.203 port 30474 ssh2 2020-09-16T20:20:20.557016xentho-1 sshd[782969]: Failed password for root from 218.92.0.203 port 30474 ssh2 2020-09-16T20:22:16.117243xent ... |
2020-09-17 09:33:56 |
| 79.167.21.54 | attackspambots | Portscan detected |
2020-09-17 09:11:23 |
| 188.92.209.235 | attackspambots | Sep 16 12:31:29 mailman postfix/smtpd[20153]: warning: unknown[188.92.209.235]: SASL PLAIN authentication failed: authentication failure |
2020-09-17 08:38:18 |
| 117.35.118.42 | attackspam | Multiple SSH authentication failures from 117.35.118.42 |
2020-09-17 09:23:45 |
| 89.238.167.10 | attackspambots | SSH-BruteForce |
2020-09-17 09:37:46 |
| 138.36.200.238 | attackbots | Brute force attempt |
2020-09-17 08:43:18 |