City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.25.75.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25620
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.25.75.57.			IN	A
;; AUTHORITY SECTION:
.			197	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:05:58 CST 2022
;; MSG SIZE  rcvd: 105
        57.75.25.130.in-addr.arpa domain name pointer net-130-25-75-57.cust.vodafonedsl.it.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
57.75.25.130.in-addr.arpa	name = net-130-25-75-57.cust.vodafonedsl.it.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 64.225.35.135 | attackbotsspam | $f2bV_matches  | 
                    2020-05-10 02:55:55 | 
| 45.13.93.90 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.13.93.90 to port 7777  | 
                    2020-05-10 02:57:10 | 
| 184.22.27.216 | attackbots | Failed password for invalid user shiva from 184.22.27.216 port 42856 ssh2  | 
                    2020-05-10 03:21:28 | 
| 49.88.112.70 | attackspam | 2020-05-09T14:52:26.711317shield sshd\[11345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70 user=root 2020-05-09T14:52:28.380814shield sshd\[11345\]: Failed password for root from 49.88.112.70 port 13753 ssh2 2020-05-09T14:52:30.892540shield sshd\[11345\]: Failed password for root from 49.88.112.70 port 13753 ssh2 2020-05-09T14:52:33.484445shield sshd\[11345\]: Failed password for root from 49.88.112.70 port 13753 ssh2 2020-05-09T14:56:02.995663shield sshd\[12385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70 user=root  | 
                    2020-05-10 03:34:23 | 
| 156.96.56.81 | attack | Brute forcing email accounts  | 
                    2020-05-10 02:56:31 | 
| 187.138.83.225 | attackspambots | Lines containing failures of 187.138.83.225 May 8 17:09:25 shared11 sshd[25232]: Invalid user pi from 187.138.83.225 port 59342 May 8 17:09:25 shared11 sshd[25233]: Invalid user pi from 187.138.83.225 port 59348 May 8 17:09:25 shared11 sshd[25232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.138.83.225 May 8 17:09:25 shared11 sshd[25233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.138.83.225 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=187.138.83.225  | 
                    2020-05-10 03:01:01 | 
| 117.50.10.134 | attack | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -  | 
                    2020-05-10 03:36:05 | 
| 31.211.191.11 | attack | Automatic report - Port Scan Attack  | 
                    2020-05-10 03:15:02 | 
| 194.26.29.114 | attackspam | May 9 13:00:09 debian-2gb-nbg1-2 kernel: \[11280886.081264\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.114 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=39532 PROTO=TCP SPT=48496 DPT=3857 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-05-10 03:15:27 | 
| 114.237.188.32 | attackbotsspam | postfix/smtpd\[2458\]: NOQUEUE: reject: RCPT from unknown\[114.237.188.32\]: 554 5.7.1 Service Client host \[114.237.188.32\] blocked using sbl-xbl.spamhaus.org\;  | 
                    2020-05-10 03:05:13 | 
| 107.161.172.118 | attackspam | May 9 14:06:44 buvik sshd[6262]: Invalid user johanna from 107.161.172.118 May 9 14:06:44 buvik sshd[6262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.161.172.118 May 9 14:06:46 buvik sshd[6262]: Failed password for invalid user johanna from 107.161.172.118 port 55372 ssh2 ...  | 
                    2020-05-10 03:33:56 | 
| 118.189.22.67 | attack | (imapd) Failed IMAP login from 118.189.22.67 (SG/Singapore/67.22.189.118.static.m1net.com.sg): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 17 07:45:04 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 3 secs): user=  | 
                    2020-05-10 03:20:30 | 
| 121.201.34.103 | attackbotsspam | May 9 08:11:14 mail sshd\[4235\]: Invalid user holdfast from 121.201.34.103 May 9 08:11:14 mail sshd\[4235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.201.34.103 May 9 08:11:16 mail sshd\[4235\]: Failed password for invalid user holdfast from 121.201.34.103 port 45804 ssh2 ...  | 
                    2020-05-10 02:54:08 | 
| 5.255.96.17 | attackbotsspam | Attempted connection to port 3388.  | 
                    2020-05-10 03:26:27 | 
| 14.245.159.21 | attack | SIP/5060 Probe, BF, Hack -  | 
                    2020-05-10 03:29:29 |