City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.92.53.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.92.53.154. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 267 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 05:39:42 CST 2025
;; MSG SIZE rcvd: 104
154.53.92.5.in-addr.arpa domain name pointer mob-5-92-53-154.net.vodafone.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
154.53.92.5.in-addr.arpa name = mob-5-92-53-154.net.vodafone.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 90.74.53.130 | attack | Sep 25 23:21:12 gw1 sshd[31456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.74.53.130 Sep 25 23:21:14 gw1 sshd[31456]: Failed password for invalid user updater from 90.74.53.130 port 44764 ssh2 ... |
2019-09-26 02:34:32 |
| 5.57.33.71 | attackbotsspam | Sep 25 18:24:00 vps691689 sshd[32286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.57.33.71 Sep 25 18:24:02 vps691689 sshd[32286]: Failed password for invalid user nagios from 5.57.33.71 port 30533 ssh2 ... |
2019-09-26 03:06:29 |
| 174.138.21.225 | attack | Sep 25 04:34:12 lcprod sshd\[18193\]: Invalid user git from 174.138.21.225 Sep 25 04:34:12 lcprod sshd\[18193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.225 Sep 25 04:34:14 lcprod sshd\[18193\]: Failed password for invalid user git from 174.138.21.225 port 37540 ssh2 Sep 25 04:39:38 lcprod sshd\[18701\]: Invalid user teamspeak3 from 174.138.21.225 Sep 25 04:39:38 lcprod sshd\[18701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.225 |
2019-09-26 03:04:38 |
| 129.204.176.234 | attackbotsspam | Sep 25 06:08:28 wbs sshd\[22550\]: Invalid user gitlab-runner from 129.204.176.234 Sep 25 06:08:28 wbs sshd\[22550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.176.234 Sep 25 06:08:30 wbs sshd\[22550\]: Failed password for invalid user gitlab-runner from 129.204.176.234 port 48354 ssh2 Sep 25 06:14:41 wbs sshd\[23179\]: Invalid user dd from 129.204.176.234 Sep 25 06:14:41 wbs sshd\[23179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.176.234 |
2019-09-26 03:08:22 |
| 203.234.19.83 | attackbotsspam | Sep 25 15:26:38 core sshd[16987]: Invalid user zjyu from 203.234.19.83 port 33214 Sep 25 15:26:40 core sshd[16987]: Failed password for invalid user zjyu from 203.234.19.83 port 33214 ssh2 ... |
2019-09-26 02:40:15 |
| 183.129.150.2 | attackbots | *Port Scan* detected from 183.129.150.2 (CN/China/-). 4 hits in the last 130 seconds |
2019-09-26 02:53:10 |
| 218.29.4.132 | attackspam | Port 1433 Scan |
2019-09-26 02:56:35 |
| 45.142.195.5 | attackbots | Sep 25 20:58:59 andromeda postfix/smtpd\[53327\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure Sep 25 20:59:06 andromeda postfix/smtpd\[42777\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure Sep 25 20:59:43 andromeda postfix/smtpd\[53327\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure Sep 25 20:59:52 andromeda postfix/smtpd\[53327\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure Sep 25 20:59:59 andromeda postfix/smtpd\[42777\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure |
2019-09-26 03:01:20 |
| 14.157.117.158 | attackspam | 23/tcp [2019-09-25]1pkt |
2019-09-26 03:13:18 |
| 82.213.224.185 | attack | Automatic report - Port Scan Attack |
2019-09-26 02:45:10 |
| 137.74.159.147 | attackspam | (sshd) Failed SSH login from 137.74.159.147 (sonar.terratex.eu): 5 in the last 3600 secs |
2019-09-26 03:02:58 |
| 180.165.1.44 | attackbots | Sep 25 20:11:43 vps691689 sshd[1454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.165.1.44 Sep 25 20:11:45 vps691689 sshd[1454]: Failed password for invalid user gmp from 180.165.1.44 port 59928 ssh2 Sep 25 20:16:27 vps691689 sshd[1506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.165.1.44 ... |
2019-09-26 02:30:46 |
| 213.198.157.182 | attackbots | 8080/tcp [2019-09-25]1pkt |
2019-09-26 02:43:01 |
| 145.239.196.248 | attack | Sep 25 08:18:55 tdfoods sshd\[6011\]: Invalid user bot from 145.239.196.248 Sep 25 08:18:55 tdfoods sshd\[6011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=248.ip-145-239-196.eu Sep 25 08:18:57 tdfoods sshd\[6011\]: Failed password for invalid user bot from 145.239.196.248 port 43822 ssh2 Sep 25 08:27:17 tdfoods sshd\[6699\]: Invalid user qhsupport from 145.239.196.248 Sep 25 08:27:17 tdfoods sshd\[6699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=248.ip-145-239-196.eu |
2019-09-26 02:37:48 |
| 188.165.250.228 | attackspambots | Sep 25 14:04:33 mail sshd[8396]: Invalid user td from 188.165.250.228 Sep 25 14:04:33 mail sshd[8396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.250.228 Sep 25 14:04:33 mail sshd[8396]: Invalid user td from 188.165.250.228 Sep 25 14:04:35 mail sshd[8396]: Failed password for invalid user td from 188.165.250.228 port 48786 ssh2 Sep 25 14:16:19 mail sshd[26870]: Invalid user direct from 188.165.250.228 ... |
2019-09-26 03:07:26 |