City: Sterzing
Region: Trentino-Alto Adige
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: Telecom Italia
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.45.163.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38104
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.45.163.213. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051600 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 16 21:06:13 CST 2019
;; MSG SIZE rcvd: 118
213.163.45.213.in-addr.arpa domain name pointer host213-163-dynamic.45-213-r.retail.telecomitalia.it.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
213.163.45.213.in-addr.arpa name = host213-163-dynamic.45-213-r.retail.telecomitalia.it.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
200.111.120.180 | attackspambots | Oct 5 01:13:03 mout sshd[22424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.111.120.180 user=root Oct 5 01:13:05 mout sshd[22424]: Failed password for root from 200.111.120.180 port 46630 ssh2 Oct 5 01:13:05 mout sshd[22424]: Disconnected from authenticating user root 200.111.120.180 port 46630 [preauth] |
2020-10-05 07:50:23 |
42.7.98.97 | attack |
|
2020-10-05 07:32:56 |
37.238.84.20 | attackbotsspam | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2020-10-05 07:40:33 |
51.15.243.117 | attackspambots | $f2bV_matches |
2020-10-05 07:31:23 |
165.232.43.124 | attack | Oct 3 16:14:26 r.ca sshd[16889]: Failed password for invalid user bruno from 165.232.43.124 port 44674 ssh2 |
2020-10-05 07:39:05 |
189.51.118.22 | attackspam |
|
2020-10-05 07:19:57 |
112.237.22.191 | attackbots | 5060/udp [2020-10-03]1pkt |
2020-10-05 07:42:52 |
34.94.192.185 | attackspam | 21 attempts against mh-ssh on air |
2020-10-05 07:49:25 |
172.220.92.210 | attack | Forbidden directory scan :: 2020/10/03 20:39:13 [error] 16144#16144: *15483 access forbidden by rule, client: 172.220.92.210, server: [censored_1], request: "GET /downloads/WebcamViewerV1.0.zip HTTP/2.0", host: "www.[censored_1]", referrer: "https://www.[censored_1]/knowledge-base/windows-8/windows-8-how-to-view-web-camera-without-installing-software/" |
2020-10-05 07:43:21 |
139.59.88.86 | attackbotsspam | Oct 5 01:19:29 OPSO sshd\[6395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.88.86 user=root Oct 5 01:19:31 OPSO sshd\[6395\]: Failed password for root from 139.59.88.86 port 55116 ssh2 Oct 5 01:23:30 OPSO sshd\[7177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.88.86 user=root Oct 5 01:23:32 OPSO sshd\[7177\]: Failed password for root from 139.59.88.86 port 60398 ssh2 Oct 5 01:27:34 OPSO sshd\[8223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.88.86 user=root |
2020-10-05 07:42:29 |
23.236.62.147 | attackspambots | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 147.62.236.23.bc.googleusercontent.com. |
2020-10-05 07:32:40 |
149.97.130.137 | attack | 1601757575 - 10/03/2020 22:39:35 Host: 149.97.130.137/149.97.130.137 Port: 445 TCP Blocked |
2020-10-05 07:19:19 |
62.114.123.136 | attackspambots | Unauthorized connection attempt from IP address 62.114.123.136 on Port 445(SMB) |
2020-10-05 07:24:34 |
116.213.52.205 | attackbotsspam | Oct 4 23:45:05 |
2020-10-05 07:43:51 |
43.226.26.186 | attackbotsspam | Oct 4 22:44:00 ip-172-31-61-156 sshd[11418]: Failed password for root from 43.226.26.186 port 39458 ssh2 Oct 4 22:43:58 ip-172-31-61-156 sshd[11418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.26.186 user=root Oct 4 22:44:00 ip-172-31-61-156 sshd[11418]: Failed password for root from 43.226.26.186 port 39458 ssh2 Oct 4 22:46:37 ip-172-31-61-156 sshd[11571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.26.186 user=root Oct 4 22:46:39 ip-172-31-61-156 sshd[11571]: Failed password for root from 43.226.26.186 port 57054 ssh2 ... |
2020-10-05 07:35:52 |