City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 79.5.54.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;79.5.54.137. IN A
;; AUTHORITY SECTION:
. 17 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024092800 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 28 20:15:30 CST 2024
;; MSG SIZE rcvd: 104
137.54.5.79.in-addr.arpa domain name pointer host-79-5-54-137.business.telecomitalia.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
137.54.5.79.in-addr.arpa name = host-79-5-54-137.business.telecomitalia.it.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
157.230.175.122 | attackbots | $f2bV_matches |
2019-08-11 05:57:10 |
187.162.11.68 | attack | Honeypot attack, port: 23, PTR: 187-162-11-68.static.axtel.net. |
2019-08-11 05:58:05 |
31.163.133.156 | attackspambots | Honeypot attack, port: 23, PTR: ws156.zone31-163-133.zaural.ru. |
2019-08-11 05:38:15 |
152.238.132.193 | attackspam | Brute forcing RDP port 3389 |
2019-08-11 06:11:08 |
178.46.109.155 | attackbotsspam | [portscan] Port scan |
2019-08-11 05:40:27 |
2606:4700::6813:c797 | attack | https://video-lal.com/videos/jeffrey- reimer-dpt-physical-therapy-assaulted-patient.html https://video-lal.com/videos/jeffrey-reimer-dpt-assaulted-patient-concentra-medical-centers.html https://videolal. com/videos/jeffrey-reimer-dpt-assaulted-patient-massage-sexual-misconduct.html Female patient assaulted, molested @ AMS Concentra Denver Colorado by physical therapists. Retaliation ensued. Patient abuse. MAJOR Cyber revenge. Fraud. STRANGE RELATIONSHIPS Eric Knight dirtsearch.org Michael Ross Roberts Rexxfield Tracy Richter murderess Videolal.com , video-lal.com. Jody Huffines Pueblo, Colorado Springs, Arkansas, Wikileaks, OVH.net, SWIPPER Registrars name.com now webzilla.com No takedowns. Constant harassment after reporting. Multiple attempts to silence victim of sexual contact and physical abuse. Racism Hall Render Mark Brian Sabey client Victim of physical therapist attacked by cyber attackers. Permanent injuries. HIPPA violations Cloud front Attacks no justice No silence EVER |
2019-08-11 05:33:11 |
139.59.135.84 | attackbots | Feb 23 23:36:00 motanud sshd\[1525\]: Invalid user dspace from 139.59.135.84 port 39972 Feb 23 23:36:00 motanud sshd\[1525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.135.84 Feb 23 23:36:02 motanud sshd\[1525\]: Failed password for invalid user dspace from 139.59.135.84 port 39972 ssh2 |
2019-08-11 05:37:58 |
122.154.56.226 | attack | 2019-08-10T19:31:17.171694enmeeting.mahidol.ac.th sshd\[17190\]: Invalid user bing from 122.154.56.226 port 51102 2019-08-10T19:31:17.186765enmeeting.mahidol.ac.th sshd\[17190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.56.226 2019-08-10T19:31:18.461655enmeeting.mahidol.ac.th sshd\[17190\]: Failed password for invalid user bing from 122.154.56.226 port 51102 ssh2 ... |
2019-08-11 05:30:10 |
182.254.222.241 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-08-11 05:40:49 |
139.180.197.43 | attackspambots | WordPress wp-login brute force :: 139.180.197.43 0.136 BYPASS [10/Aug/2019:22:08:12 1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-08-11 06:17:31 |
220.191.226.10 | attack | Aug 10 22:27:16 mail sshd\[14858\]: Failed password for invalid user indu from 220.191.226.10 port 45459 ssh2 Aug 10 22:44:32 mail sshd\[15158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.191.226.10 user=root ... |
2019-08-11 05:51:59 |
167.99.143.90 | attack | Aug 10 22:04:26 bouncer sshd\[7376\]: Invalid user admin from 167.99.143.90 port 54812 Aug 10 22:04:26 bouncer sshd\[7376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.143.90 Aug 10 22:04:28 bouncer sshd\[7376\]: Failed password for invalid user admin from 167.99.143.90 port 54812 ssh2 ... |
2019-08-11 05:55:50 |
123.200.11.230 | attack | Mail sent to address hacked/leaked from Last.fm |
2019-08-11 06:01:39 |
36.66.105.159 | attackbots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-08-11 05:35:39 |
187.73.231.244 | attackspambots | [Sat Aug 10 19:08:37.022344 2019] [:error] [pid 31623:tid 139714648553216] [client 187.73.231.244:39454] [client 187.73.231.244] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.1.1/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "792"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197:80"] [severity "WARNING"] [ver "OWASP_CRS/3.1.1"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XU6zxe2gkJ4JTbKrdjtzzgAAABM"] ... |
2019-08-11 06:05:24 |