City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.53.78.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.53.78.254.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 13:57:54 CST 2025
;; MSG SIZE  rcvd: 106254.78.53.136.in-addr.arpa domain name pointer 136-53-78-254.googlefiber.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
254.78.53.136.in-addr.arpa	name = 136-53-78-254.googlefiber.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 218.95.121.144 | attack | badbot | 2019-11-22 17:55:05 | 
| 103.221.223.126 | attackbotsspam | Nov 22 09:24:55 hosting sshd[23053]: Invalid user dhcpd from 103.221.223.126 port 43902 ... | 2019-11-22 17:51:18 | 
| 182.73.143.214 | attackbotsspam | [FriNov2207:24:25.5101172019][:error][pid27636:tid46969311495936][client182.73.143.214:43150][client182.73.143.214]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(\^w3c-\|systran\\\\\\\\\)\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"208"][id"330039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(libwww-perl\).Disablethisruleifyouuselibwww-perl."][severity"CRITICAL"][hostname"www.grottino-ticinese.ch"][uri"/"][unique_id"Xdd-Ga@wHjcCOvqFSZjxKwAAAdU"][FriNov2207:24:25.8410922019][:error][pid27511:tid46969315698432][client182.73.143.214:48512][client182.73.143.214]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(\^w3c-\|systran\\\\\\\\\)\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"208"][id"330039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(libwww-perl\).Disablethisruleify | 2019-11-22 18:16:05 | 
| 125.105.157.101 | attackspambots | badbot | 2019-11-22 18:06:28 | 
| 218.201.242.15 | attackspambots | badbot | 2019-11-22 17:38:18 | 
| 129.226.129.191 | attackspam | Nov 22 07:24:49 dedicated sshd[14692]: Invalid user fuqua from 129.226.129.191 port 51170 | 2019-11-22 17:56:29 | 
| 118.69.34.194 | attackspam | Unauthorized connection attempt from IP address 118.69.34.194 on Port 445(SMB) | 2019-11-22 18:04:58 | 
| 62.234.65.92 | attackbots | 2019-11-22T07:31:24.272324abusebot-6.cloudsearch.cf sshd\[5452\]: Invalid user nicolay from 62.234.65.92 port 52116 | 2019-11-22 17:44:48 | 
| 5.1.88.50 | attack | $f2bV_matches | 2019-11-22 17:51:40 | 
| 122.228.19.79 | attackspam | 122.228.19.79 was recorded 27 times by 8 hosts attempting to connect to the following ports: 2083,8069,8005,1026,3389,28015,3690,7443,40001,389,104,7548,7001,264,179,8086,8004,4730,5357,9418,10001,631,1433,16993,2480,9295. Incident counter (4h, 24h, all-time): 27, 160, 3486 | 2019-11-22 18:04:26 | 
| 31.129.179.137 | attackspam | Portscan or hack attempt detected by psad/fwsnort | 2019-11-22 17:47:48 | 
| 137.74.119.50 | attackbots | Nov 22 09:30:52 lnxded64 sshd[13417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.119.50 | 2019-11-22 17:49:37 | 
| 117.92.126.150 | attackspambots | badbot | 2019-11-22 17:42:34 | 
| 197.155.141.9 | attackbots | SMB Server BruteForce Attack | 2019-11-22 18:12:44 | 
| 196.52.43.85 | attackspam | " " | 2019-11-22 17:41:43 |