City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.239.159.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.239.159.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 20:11:04 CST 2025
;; MSG SIZE rcvd: 106
140.159.239.2.in-addr.arpa domain name pointer 2-239-159-140.ip249.fastwebnet.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.159.239.2.in-addr.arpa name = 2-239-159-140.ip249.fastwebnet.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 62.119.14.198 | attackbots | Nov 27 17:35:34 vpn sshd[9772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.119.14.198 Nov 27 17:35:36 vpn sshd[9772]: Failed password for invalid user www from 62.119.14.198 port 40752 ssh2 Nov 27 17:42:07 vpn sshd[9804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.119.14.198 |
2020-01-05 19:46:36 |
| 61.79.105.97 | attackspam | Mar 8 07:41:41 vpn sshd[16055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.79.105.97 Mar 8 07:41:43 vpn sshd[16055]: Failed password for invalid user mf from 61.79.105.97 port 55732 ssh2 Mar 8 07:49:16 vpn sshd[16076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.79.105.97 |
2020-01-05 20:02:59 |
| 222.186.175.150 | attackspam | Fail2Ban - SSH Bruteforce Attempt |
2020-01-05 20:08:06 |
| 89.38.145.86 | attackbots | Unauthorized connection attempt detected from IP address 89.38.145.86 to port 81 [J] |
2020-01-05 20:21:59 |
| 163.44.159.221 | attack | Unauthorized connection attempt detected from IP address 163.44.159.221 to port 2220 [J] |
2020-01-05 20:09:04 |
| 61.75.86.240 | attack | Nov 16 00:50:17 vpn sshd[32746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.75.86.240 Nov 16 00:50:19 vpn sshd[32746]: Failed password for invalid user opc from 61.75.86.240 port 43664 ssh2 Nov 16 00:50:21 vpn sshd[32748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.75.86.240 |
2020-01-05 20:07:31 |
| 185.184.79.31 | attackspam | firewall-block, port(s): 3390/tcp, 33890/tcp |
2020-01-05 20:23:32 |
| 222.186.175.217 | attackspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217 user=root Failed password for root from 222.186.175.217 port 48254 ssh2 Failed password for root from 222.186.175.217 port 48254 ssh2 Failed password for root from 222.186.175.217 port 48254 ssh2 Failed password for root from 222.186.175.217 port 48254 ssh2 |
2020-01-05 20:18:30 |
| 62.110.101.82 | attackbotsspam | Dec 27 10:29:14 vpn sshd[14600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.110.101.82 Dec 27 10:29:16 vpn sshd[14600]: Failed password for invalid user nova from 62.110.101.82 port 27009 ssh2 Dec 27 10:33:39 vpn sshd[14617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.110.101.82 |
2020-01-05 19:47:50 |
| 5.217.249.239 | normal | 4444444444444 |
2020-01-05 19:54:14 |
| 61.74.109.80 | attackspam | Jan 23 09:27:22 vpn sshd[26602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.109.80 Jan 23 09:27:24 vpn sshd[26602]: Failed password for invalid user helio from 61.74.109.80 port 50056 ssh2 Jan 23 09:33:07 vpn sshd[26621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.109.80 |
2020-01-05 20:08:41 |
| 61.91.126.151 | attackbotsspam | Jan 10 04:58:48 vpn sshd[2027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.91.126.151 Jan 10 04:58:50 vpn sshd[2027]: Failed password for invalid user postgres from 61.91.126.151 port 38270 ssh2 Jan 10 05:02:37 vpn sshd[2062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.91.126.151 |
2020-01-05 19:56:00 |
| 152.246.205.28 | attackspambots | SSH invalid-user multiple login attempts |
2020-01-05 19:52:35 |
| 61.37.82.220 | attack | Feb 25 06:37:54 vpn sshd[5966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.37.82.220 Feb 25 06:37:56 vpn sshd[5966]: Failed password for invalid user test from 61.37.82.220 port 40822 ssh2 Feb 25 06:45:08 vpn sshd[6059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.37.82.220 |
2020-01-05 20:17:24 |
| 61.90.111.180 | attack | Oct 1 19:35:00 vpn sshd[9411]: Invalid user pi from 61.90.111.180 Oct 1 19:35:00 vpn sshd[9413]: Invalid user pi from 61.90.111.180 Oct 1 19:35:00 vpn sshd[9411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.90.111.180 Oct 1 19:35:00 vpn sshd[9413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.90.111.180 Oct 1 19:35:02 vpn sshd[9411]: Failed password for invalid user pi from 61.90.111.180 port 51878 ssh2 |
2020-01-05 20:01:06 |