City: Vigevano
Region: Lombardy
Country: Italy
Internet Service Provider: Vodafone Italia S.p.A.
Hostname: unknown
Organization: Vodafone Italia S.p.A.
Usage Type: unknown
| Type | Details | Datetime |
|---|---|---|
| attack | suspicious action Mon, 24 Feb 2020 01:44:53 -0300 |
2020-02-24 20:03:35 |
| attack | Unauthorised access (Feb 16) SRC=2.45.131.197 LEN=40 TOS=0x08 TTL=246 ID=46612 TCP DPT=1433 WINDOW=1024 SYN |
2020-02-16 21:46:09 |
| attackbots | Honeypot attack, port: 445, PTR: net-2-45-131-197.cust.vodafonedsl.it. |
2020-02-11 09:08:34 |
| attack | unauthorized connection attempt |
2020-02-04 14:15:17 |
| attackspambots | firewall-block, port(s): 1433/tcp |
2019-12-09 08:05:54 |
| attackbotsspam | Unauthorised access (Oct 29) SRC=2.45.131.197 LEN=40 TOS=0x08 TTL=243 ID=62842 TCP DPT=1433 WINDOW=1024 SYN |
2019-10-30 06:38:24 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.45.131.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42432
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.45.131.197. IN A
;; AUTHORITY SECTION:
. 3200 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019041502 1800 900 604800 86400
;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 16 12:29:05 +08 2019
;; MSG SIZE rcvd: 116
197.131.45.2.in-addr.arpa domain name pointer net-2-45-131-197.cust.vodafonedsl.it.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
197.131.45.2.in-addr.arpa name = net-2-45-131-197.cust.vodafonedsl.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.99.245.135 | attackbots | $f2bV_matches |
2020-05-29 22:54:31 |
| 89.248.172.101 | attack | 05/29/2020-10:25:52.567804 89.248.172.101 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-29 22:31:15 |
| 176.113.115.247 | attack | Port Scan |
2020-05-29 22:24:28 |
| 89.248.160.178 | attackspam | scans 5 times in preceeding hours on the ports (in chronological order) 5339 5750 4460 3520 33444 resulting in total of 26 scans from 89.248.160.0-89.248.174.255 block. |
2020-05-29 22:32:13 |
| 194.26.25.110 | attack | Port Scan |
2020-05-29 22:11:45 |
| 159.89.201.59 | attackspambots | 2020-05-29T22:06:30.239805vivaldi2.tree2.info sshd[2642]: Failed password for root from 159.89.201.59 port 37498 ssh2 2020-05-29T22:07:59.952723vivaldi2.tree2.info sshd[2689]: Invalid user zhaowei from 159.89.201.59 2020-05-29T22:07:59.963491vivaldi2.tree2.info sshd[2689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.59 2020-05-29T22:07:59.952723vivaldi2.tree2.info sshd[2689]: Invalid user zhaowei from 159.89.201.59 2020-05-29T22:08:01.588118vivaldi2.tree2.info sshd[2689]: Failed password for invalid user zhaowei from 159.89.201.59 port 45102 ssh2 ... |
2020-05-29 22:49:37 |
| 185.176.27.90 | attackspambots | Port Scan |
2020-05-29 22:18:57 |
| 189.126.94.106 | attackbots | Port Scan |
2020-05-29 22:13:28 |
| 196.202.71.42 | attackbots | firewall-block, port(s): 445/tcp |
2020-05-29 22:53:08 |
| 94.102.51.17 | attack | May 29 15:50:55 debian-2gb-nbg1-2 kernel: \[13019040.291261\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.17 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=50513 PROTO=TCP SPT=46961 DPT=3378 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-29 22:29:16 |
| 193.32.163.44 | attackbots | Port Scan |
2020-05-29 22:12:33 |
| 108.31.246.142 | attackspam | Port Scan |
2020-05-29 22:28:54 |
| 46.174.191.28 | attack | Port Scan |
2020-05-29 22:33:49 |
| 80.211.30.166 | attackbots | May 29 09:16:48 firewall sshd[2442]: Failed password for invalid user test from 80.211.30.166 port 45866 ssh2 May 29 09:20:41 firewall sshd[2585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.30.166 user=root May 29 09:20:43 firewall sshd[2585]: Failed password for root from 80.211.30.166 port 52494 ssh2 ... |
2020-05-29 22:40:05 |
| 185.156.73.52 | attackbots | 05/29/2020-09:52:05.709401 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-29 22:21:41 |