City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 151.45.66.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;151.45.66.91.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:38:07 CST 2025
;; MSG SIZE  rcvd: 105
        91.66.45.151.in-addr.arpa domain name pointer adsl-ull-91-66.45-151.wind.it.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
91.66.45.151.in-addr.arpa	name = adsl-ull-91-66.45-151.wind.it.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 107.180.121.1 | attack | xmlrpc attack  | 
                    2019-10-21 01:19:44 | 
| 185.40.14.59 | attack | " "  | 
                    2019-10-21 01:02:51 | 
| 159.65.146.141 | attackbots | Oct 20 15:32:45 pkdns2 sshd\[20032\]: Invalid user debian@123 from 159.65.146.141Oct 20 15:32:47 pkdns2 sshd\[20032\]: Failed password for invalid user debian@123 from 159.65.146.141 port 52464 ssh2Oct 20 15:36:54 pkdns2 sshd\[20205\]: Invalid user tandy from 159.65.146.141Oct 20 15:36:56 pkdns2 sshd\[20205\]: Failed password for invalid user tandy from 159.65.146.141 port 34500 ssh2Oct 20 15:41:03 pkdns2 sshd\[20418\]: Invalid user Black123 from 159.65.146.141Oct 20 15:41:05 pkdns2 sshd\[20418\]: Failed password for invalid user Black123 from 159.65.146.141 port 44764 ssh2 ...  | 
                    2019-10-21 00:58:14 | 
| 45.148.233.229 | attackspam | 45.148.233.229 - - [20/Oct/2019:08:00:03 -0400] "GET /?page=..%2f..%2f..%2fetc%2fpasswd%00&action=view&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 16398 "https://newportbrassfaucets.com/?page=..%2f..%2f..%2fetc%2fpasswd%00&action=view&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36" ...  | 
                    2019-10-21 01:01:57 | 
| 58.221.204.114 | attack | Oct 20 19:47:25 sauna sshd[92601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.204.114 Oct 20 19:47:27 sauna sshd[92601]: Failed password for invalid user Mark2017 from 58.221.204.114 port 51166 ssh2 ...  | 
                    2019-10-21 01:01:20 | 
| 125.161.136.17 | attackbots | Unauthorized connection attempt from IP address 125.161.136.17 on Port 445(SMB)  | 
                    2019-10-21 00:34:06 | 
| 83.20.155.114 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/83.20.155.114/ PL - 1H : (84) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : PL NAME ASN : ASN5617 IP : 83.20.155.114 CIDR : 83.20.0.0/14 PREFIX COUNT : 183 UNIQUE IP COUNT : 5363456 ATTACKS DETECTED ASN5617 : 1H - 1 3H - 4 6H - 6 12H - 14 24H - 30 DateTime : 2019-10-20 14:00:12 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN - data recovery  | 
                    2019-10-21 01:01:01 | 
| 41.201.193.180 | attackspambots | Unauthorized connection attempt from IP address 41.201.193.180 on Port 445(SMB)  | 
                    2019-10-21 00:45:26 | 
| 112.85.42.227 | attack | Oct 20 11:31:16 TORMINT sshd\[30075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227 user=root Oct 20 11:31:18 TORMINT sshd\[30075\]: Failed password for root from 112.85.42.227 port 37938 ssh2 Oct 20 11:34:11 TORMINT sshd\[30244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227 user=root ...  | 
                    2019-10-21 01:19:26 | 
| 59.25.197.138 | attack | Oct 20 17:23:02 XXX sshd[51229]: Invalid user ofsaa from 59.25.197.138 port 45616  | 
                    2019-10-21 01:13:39 | 
| 45.136.110.16 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 32 - port: 3390 proto: TCP cat: Misc Attack  | 
                    2019-10-21 00:44:14 | 
| 185.40.12.39 | attack | slow and persistent scanner  | 
                    2019-10-21 01:23:17 | 
| 185.209.0.83 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 18497 proto: TCP cat: Misc Attack  | 
                    2019-10-21 00:32:44 | 
| 183.65.30.2 | attackspam | " "  | 
                    2019-10-21 00:41:31 | 
| 59.127.32.39 | attackbotsspam | firewall-block, port(s): 9001/tcp  | 
                    2019-10-21 00:51:03 |