City: Campi Bisenzio
Region: Tuscany
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 79.60.99.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;79.60.99.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 08:52:11 CST 2025
;; MSG SIZE rcvd: 104
55.99.60.79.in-addr.arpa domain name pointer host-79-60-99-55.business.telecomitalia.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
55.99.60.79.in-addr.arpa name = host-79-60-99-55.business.telecomitalia.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 60.169.3.57 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-14 23:13:56 |
| 185.143.223.139 | attackspambots | firewall-block, port(s): 36024/tcp, 36050/tcp, 36074/tcp, 36216/tcp, 36291/tcp, 36293/tcp, 36505/tcp, 36518/tcp, 36639/tcp, 36719/tcp, 36721/tcp, 36723/tcp, 36822/tcp, 36851/tcp, 36853/tcp, 36916/tcp, 36959/tcp |
2019-11-14 23:46:07 |
| 190.237.104.241 | attack | 2019-11-14T08:58:27.4314041495-001 sshd\[28570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.237.104.241 user=root 2019-11-14T08:58:29.6860391495-001 sshd\[28570\]: Failed password for root from 190.237.104.241 port 55874 ssh2 2019-11-14T09:22:51.1380091495-001 sshd\[30054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.237.104.241 user=root 2019-11-14T09:22:52.7096601495-001 sshd\[30054\]: Failed password for root from 190.237.104.241 port 32782 ssh2 2019-11-14T09:30:12.8025931495-001 sshd\[30348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.237.104.241 user=root 2019-11-14T09:30:14.9164231495-001 sshd\[30348\]: Failed password for root from 190.237.104.241 port 35784 ssh2 ... |
2019-11-14 23:32:14 |
| 54.186.180.241 | attackspambots | 11/14/2019-16:18:02.901331 54.186.180.241 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-11-14 23:28:32 |
| 218.219.246.124 | attackbots | Nov 14 16:12:53 rotator sshd\[16568\]: Invalid user isaque from 218.219.246.124Nov 14 16:12:55 rotator sshd\[16568\]: Failed password for invalid user isaque from 218.219.246.124 port 60236 ssh2Nov 14 16:19:02 rotator sshd\[17386\]: Invalid user dovecot from 218.219.246.124Nov 14 16:19:04 rotator sshd\[17386\]: Failed password for invalid user dovecot from 218.219.246.124 port 36162 ssh2Nov 14 16:22:51 rotator sshd\[18162\]: Invalid user alistair from 218.219.246.124Nov 14 16:22:53 rotator sshd\[18162\]: Failed password for invalid user alistair from 218.219.246.124 port 59776 ssh2 ... |
2019-11-14 23:31:31 |
| 94.237.73.149 | attackspambots | Automatic report - XMLRPC Attack |
2019-11-14 23:16:05 |
| 132.148.26.10 | attack | Automatic report - XMLRPC Attack |
2019-11-14 23:12:30 |
| 132.145.201.163 | attack | Nov 14 05:11:48 auw2 sshd\[20644\]: Invalid user csgoserver from 132.145.201.163 Nov 14 05:11:48 auw2 sshd\[20644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.201.163 Nov 14 05:11:50 auw2 sshd\[20644\]: Failed password for invalid user csgoserver from 132.145.201.163 port 34674 ssh2 Nov 14 05:15:46 auw2 sshd\[20960\]: Invalid user guest from 132.145.201.163 Nov 14 05:15:46 auw2 sshd\[20960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.201.163 |
2019-11-14 23:27:18 |
| 207.38.86.224 | attackbots | Automatic report - XMLRPC Attack |
2019-11-14 23:35:22 |
| 163.172.251.210 | attack | Automatic report - XMLRPC Attack |
2019-11-14 23:09:12 |
| 46.38.144.179 | attackbots | Nov 14 16:07:34 webserver postfix/smtpd\[29520\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 14 16:08:45 webserver postfix/smtpd\[31469\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 14 16:09:56 webserver postfix/smtpd\[29520\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 14 16:11:07 webserver postfix/smtpd\[31469\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 14 16:12:17 webserver postfix/smtpd\[29520\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-11-14 23:13:04 |
| 77.42.74.58 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-14 23:08:43 |
| 81.213.214.225 | attackspambots | Nov 14 11:32:30 firewall sshd[26609]: Failed password for invalid user mathe from 81.213.214.225 port 58051 ssh2 Nov 14 11:41:17 firewall sshd[26750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.213.214.225 user=root Nov 14 11:41:19 firewall sshd[26750]: Failed password for root from 81.213.214.225 port 48634 ssh2 ... |
2019-11-14 23:16:23 |
| 138.122.29.104 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-14 23:18:42 |
| 140.143.196.247 | attackspambots | Nov 14 04:35:07 hanapaa sshd\[18093\]: Invalid user cg from 140.143.196.247 Nov 14 04:35:07 hanapaa sshd\[18093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.196.247 Nov 14 04:35:09 hanapaa sshd\[18093\]: Failed password for invalid user cg from 140.143.196.247 port 60422 ssh2 Nov 14 04:41:02 hanapaa sshd\[18662\]: Invalid user agnieszka from 140.143.196.247 Nov 14 04:41:02 hanapaa sshd\[18662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.196.247 |
2019-11-14 23:27:00 |