City: Turin
Region: Piedmont
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.192.0.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.192.0.117.			IN	A
;; AUTHORITY SECTION:
.			191	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 10:35:23 CST 2022
;; MSG SIZE  rcvd: 106b'Host 117.0.192.130.in-addr.arpa. not found: 3(NXDOMAIN)
'Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 117.0.192.130.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 89.33.8.34 | attackbotsspam | 15.10.2019 19:51:28 Recursive DNS scan | 2019-10-16 09:02:33 | 
| 104.244.72.98 | attackspambots | $f2bV_matches | 2019-10-16 08:38:53 | 
| 217.112.128.75 | attackbotsspam | Postfix DNSBL listed. Trying to send SPAM. | 2019-10-16 08:25:18 | 
| 77.238.128.220 | attackbotsspam | [portscan] Port scan | 2019-10-16 09:01:07 | 
| 2400:6180:100:d0::8da:a001 | attackbotsspam | Wordpress attack | 2019-10-16 08:59:45 | 
| 91.121.142.225 | attackspam | Oct 16 02:25:20 icinga sshd[41703]: Failed password for root from 91.121.142.225 port 57258 ssh2 Oct 16 02:28:55 icinga sshd[44173]: Failed password for root from 91.121.142.225 port 40170 ssh2 Oct 16 02:32:28 icinga sshd[45479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.142.225 ... | 2019-10-16 08:51:58 | 
| 106.13.59.16 | attackbotsspam | Oct 16 03:35:39 sauna sshd[225707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.59.16 Oct 16 03:35:41 sauna sshd[225707]: Failed password for invalid user mdh from 106.13.59.16 port 58090 ssh2 ... | 2019-10-16 08:41:09 | 
| 45.142.195.5 | attackbots | Oct 16 02:30:50 webserver postfix/smtpd\[15753\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 16 02:31:09 webserver postfix/smtpd\[15487\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 16 02:31:59 webserver postfix/smtpd\[15753\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 16 02:32:47 webserver postfix/smtpd\[15753\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 16 02:33:34 webserver postfix/smtpd\[15487\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... | 2019-10-16 08:42:01 | 
| 80.211.16.26 | attackbots | Oct 15 17:10:46 plusreed sshd[31574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.16.26 user=root Oct 15 17:10:47 plusreed sshd[31574]: Failed password for root from 80.211.16.26 port 48498 ssh2 ... | 2019-10-16 08:35:06 | 
| 49.204.228.125 | attackbots | wp-login.php | 2019-10-16 08:31:30 | 
| 107.180.122.15 | attackspambots | Probing for vulnerable PHP code /wp-includes/js/codemirror/kaoytpqx.php | 2019-10-16 08:28:07 | 
| 106.12.98.12 | attack | Oct 16 03:17:25 sauna sshd[225395]: Failed password for root from 106.12.98.12 port 38376 ssh2 ... | 2019-10-16 08:31:14 | 
| 164.52.24.237 | attackbotsspam | " " | 2019-10-16 08:26:09 | 
| 211.147.216.19 | attackbotsspam | Oct 15 16:46:17 ny01 sshd[28365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.147.216.19 Oct 15 16:46:19 ny01 sshd[28365]: Failed password for invalid user rl from 211.147.216.19 port 58636 ssh2 Oct 15 16:50:34 ny01 sshd[28728]: Failed password for root from 211.147.216.19 port 38156 ssh2 | 2019-10-16 08:57:54 | 
| 222.252.30.117 | attackbotsspam | Oct 16 00:42:51 www2 sshd\[1785\]: Failed password for root from 222.252.30.117 port 43952 ssh2Oct 16 00:47:05 www2 sshd\[2589\]: Failed password for root from 222.252.30.117 port 34910 ssh2Oct 16 00:51:27 www2 sshd\[3076\]: Failed password for root from 222.252.30.117 port 54104 ssh2 ... | 2019-10-16 08:27:17 |