City: Nuoro
Region: Sardinia
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: Telecom Italia
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 79.46.86.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48630
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;79.46.86.25. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019050201 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 03 02:19:04 +08 2019
;; MSG SIZE rcvd: 115
25.86.46.79.in-addr.arpa domain name pointer host25-86-dynamic.46-79-r.retail.telecomitalia.it.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
25.86.46.79.in-addr.arpa name = host25-86-dynamic.46-79-r.retail.telecomitalia.it.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
175.184.166.247 | attackbots | The IP has triggered Cloudflare WAF. CF-Ray: 53d2e4b36c9293e8 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/4.047745454 Mozilla/4.0 (compatible; MSIE 5.00; Windows 98) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-11-30 07:11:05 |
106.12.24.1 | attack | SSH brute-force: detected 6 distinct usernames within a 24-hour window. |
2019-11-30 06:54:03 |
35.201.136.218 | attack | The IP has triggered Cloudflare WAF. CF-Ray: 53d4bd2d0beaf0a9 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: XX | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: d.skk.moe | User-Agent: QQ%E6%B5%8F%E8%A7%88%E5%99%A8/9.6.2.4196 CFNetwork/1107.1 Darwin/19.0.0 | CF_DC: TPE. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-11-30 07:15:34 |
103.129.221.6 | attackspam | SSH login attempts with user root. |
2019-11-30 07:07:22 |
192.95.14.196 | bots | Excessive page not found. Auto locked out. |
2019-11-30 07:15:29 |
209.17.97.26 | attackbotsspam | 209.17.97.26 was recorded 7 times by 5 hosts attempting to connect to the following ports: 990,5916,37777,8081. Incident counter (4h, 24h, all-time): 7, 44, 900 |
2019-11-30 07:09:24 |
104.244.79.1 | attackspam | SSH login attempts with user root. |
2019-11-30 06:56:49 |
103.56.113.6 | attack | SSH login attempts with user root. |
2019-11-30 07:04:48 |
143.255.241.105 | attackbotsspam | 8080/tcp 8080/tcp [2019-10-20/11-29]2pkt |
2019-11-30 06:51:13 |
116.252.0.72 | attackbots | The IP has triggered Cloudflare WAF. CF-Ray: 53d0385cbbf4983f | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/4.047745454 Mozilla/4.0 (compatible; MSIE 5.00; Windows 98) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-11-30 07:12:22 |
109.102.158.1 | attackspambots | SSH login attempts with user root. |
2019-11-30 06:46:33 |
5.39.82.197 | attackspambots | 2019-11-29T15:39:20.3530081495-001 sshd\[43776\]: Failed password for invalid user bergren from 5.39.82.197 port 52280 ssh2 2019-11-29T16:41:06.8939751495-001 sshd\[46094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3270404.ip-5-39-82.eu user=root 2019-11-29T16:41:08.4177681495-001 sshd\[46094\]: Failed password for root from 5.39.82.197 port 45586 ssh2 2019-11-29T16:51:00.2055361495-001 sshd\[46520\]: Invalid user webadmin from 5.39.82.197 port 51960 2019-11-29T16:51:00.2153321495-001 sshd\[46520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3270404.ip-5-39-82.eu 2019-11-29T16:51:02.5133051495-001 sshd\[46520\]: Failed password for invalid user webadmin from 5.39.82.197 port 51960 ssh2 ... |
2019-11-30 06:48:04 |
106.13.15.1 | attackspambots | SSH login attempts with user root. |
2019-11-30 06:53:20 |
182.138.162.157 | attackbots | The IP has triggered Cloudflare WAF. CF-Ray: 53cfb99b5977775e | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/4.074482891 Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-11-30 07:10:40 |
182.61.58.131 | attack | Invalid user server from 182.61.58.131 port 53076 |
2019-11-30 07:20:28 |