City: Castellana
Region: Regione Puglia
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.204.189.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27324
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.204.189.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050502 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 14:09:54 CST 2026
;; MSG SIZE rcvd: 107
12.189.204.193.in-addr.arpa domain name pointer teddy.grupporeti.uniba.it.
12.189.204.193.in-addr.arpa domain name pointer lupo.grupporeti.uniba.it.
12.189.204.193.in-addr.arpa domain name pointer gateway.uniba.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.189.204.193.in-addr.arpa name = lupo.grupporeti.uniba.it.
12.189.204.193.in-addr.arpa name = gateway.uniba.it.
12.189.204.193.in-addr.arpa name = teddy.grupporeti.uniba.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 187.5.3.56 | attackspambots | Brute-force attempt banned |
2020-05-11 13:13:55 |
| 119.28.178.226 | attackspam | SSH login attempts. |
2020-05-11 13:16:21 |
| 157.245.221.244 | attack | May 11 05:44:58 server sshd[28610]: Failed password for invalid user saman from 157.245.221.244 port 38306 ssh2 May 11 05:52:51 server sshd[34295]: Failed password for root from 157.245.221.244 port 33942 ssh2 May 11 05:55:45 server sshd[36815]: Failed password for invalid user lt from 157.245.221.244 port 60952 ssh2 |
2020-05-11 12:51:13 |
| 195.93.148.234 | attackbots | 1589169328 - 05/11/2020 05:55:28 Host: 195.93.148.234/195.93.148.234 Port: 445 TCP Blocked |
2020-05-11 13:07:02 |
| 117.6.128.222 | attackspambots | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-05-11 13:08:17 |
| 114.27.99.141 | attack | Port probing on unauthorized port 23 |
2020-05-11 13:10:31 |
| 182.150.57.34 | attackbots | May 11 03:50:19 ip-172-31-62-245 sshd\[3343\]: Invalid user postgres from 182.150.57.34\ May 11 03:50:21 ip-172-31-62-245 sshd\[3343\]: Failed password for invalid user postgres from 182.150.57.34 port 17537 ssh2\ May 11 03:54:07 ip-172-31-62-245 sshd\[3385\]: Invalid user clock from 182.150.57.34\ May 11 03:54:10 ip-172-31-62-245 sshd\[3385\]: Failed password for invalid user clock from 182.150.57.34 port 33872 ssh2\ May 11 03:56:00 ip-172-31-62-245 sshd\[3413\]: Invalid user history from 182.150.57.34\ |
2020-05-11 12:33:27 |
| 222.186.30.59 | attackspambots | May 11 00:36:18 ny01 sshd[16238]: Failed password for root from 222.186.30.59 port 37927 ssh2 May 11 00:39:04 ny01 sshd[16581]: Failed password for root from 222.186.30.59 port 31999 ssh2 |
2020-05-11 13:00:11 |
| 176.119.28.244 | attack | May 11 06:22:23 piServer sshd[1404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.119.28.244 May 11 06:22:25 piServer sshd[1404]: Failed password for invalid user gtadmin from 176.119.28.244 port 36636 ssh2 May 11 06:26:22 piServer sshd[1972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.119.28.244 ... |
2020-05-11 12:40:01 |
| 140.238.16.127 | attack | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-05-11 12:33:50 |
| 45.142.195.7 | attackspam | May 11 06:16:35 mail postfix/smtpd\[20228\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ May 11 06:17:27 mail postfix/smtpd\[20231\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ May 11 06:18:18 mail postfix/smtpd\[20315\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ May 11 06:49:00 mail postfix/smtpd\[20742\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-05-11 12:52:24 |
| 98.204.69.141 | attackspam | 2020-05-11T04:36:43.861203shield sshd\[31379\]: Invalid user deploy from 98.204.69.141 port 53980 2020-05-11T04:36:43.864809shield sshd\[31379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-204-69-141.hsd1.dc.comcast.net 2020-05-11T04:36:46.342509shield sshd\[31379\]: Failed password for invalid user deploy from 98.204.69.141 port 53980 ssh2 2020-05-11T04:40:36.324686shield sshd\[32424\]: Invalid user team from 98.204.69.141 port 35308 2020-05-11T04:40:36.328283shield sshd\[32424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-204-69-141.hsd1.dc.comcast.net |
2020-05-11 12:43:53 |
| 134.209.236.191 | attackbots | May 11 06:05:15 prod4 sshd\[6299\]: Failed password for root from 134.209.236.191 port 37436 ssh2 May 11 06:10:35 prod4 sshd\[7530\]: Invalid user pastor from 134.209.236.191 May 11 06:10:37 prod4 sshd\[7530\]: Failed password for invalid user pastor from 134.209.236.191 port 52216 ssh2 ... |
2020-05-11 12:53:10 |
| 185.176.27.246 | attackbotsspam | 05/11/2020-07:16:16.487042 185.176.27.246 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-11 13:18:50 |
| 175.125.95.160 | attack | May 11 05:44:29 server sshd[28289]: Failed password for invalid user chb from 175.125.95.160 port 46208 ssh2 May 11 05:51:13 server sshd[33169]: Failed password for invalid user f2 from 175.125.95.160 port 56332 ssh2 May 11 05:55:39 server sshd[36532]: Failed password for invalid user ubnt from 175.125.95.160 port 39044 ssh2 |
2020-05-11 12:55:37 |