City: Cantello
Region: Lombardy
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.20.0.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.20.0.0. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 08:31:19 CST 2025
;; MSG SIZE rcvd: 102
0.0.20.80.in-addr.arpa domain name pointer host-80-20-0-0.business.telecomitalia.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
0.0.20.80.in-addr.arpa name = host-80-20-0-0.business.telecomitalia.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.180.41 | attack | Oct 22 16:51:57 odroid64 sshd\[21758\]: User root from 222.186.180.41 not allowed because not listed in AllowUsers Oct 22 16:51:58 odroid64 sshd\[21758\]: Failed none for invalid user root from 222.186.180.41 port 5834 ssh2 ... |
2019-10-22 23:03:16 |
| 77.247.110.162 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-22 23:14:06 |
| 222.186.180.223 | attackspambots | 10/22/2019-11:05:00.919254 222.186.180.223 Protocol: 6 ET SCAN Potential SSH Scan |
2019-10-22 23:07:57 |
| 89.248.160.193 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 85 - port: 8707 proto: TCP cat: Misc Attack |
2019-10-22 22:33:59 |
| 94.20.81.236 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-22 23:08:38 |
| 197.255.216.182 | attackbots | Brute force attempt |
2019-10-22 23:00:47 |
| 187.188.193.211 | attackbotsspam | Invalid user odoo from 187.188.193.211 port 41136 |
2019-10-22 22:41:52 |
| 218.153.159.198 | attack | $f2bV_matches |
2019-10-22 22:52:25 |
| 222.186.175.202 | attackbots | Oct 22 10:37:52 debian sshd[10893]: Unable to negotiate with 222.186.175.202 port 24950: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Oct 22 11:15:15 debian sshd[15011]: Unable to negotiate with 222.186.175.202 port 16966: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2019-10-22 23:18:09 |
| 111.74.1.195 | attackbotsspam | 2019-10-22T14:50:45.468456scmdmz1 sshd\[1963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.74.1.195 user=root 2019-10-22T14:50:47.132296scmdmz1 sshd\[1963\]: Failed password for root from 111.74.1.195 port 50352 ssh2 2019-10-22T14:50:50.111076scmdmz1 sshd\[1992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.74.1.195 user=root ... |
2019-10-22 23:04:05 |
| 40.117.171.237 | attack | 2019-10-22T12:22:29.152411abusebot-4.cloudsearch.cf sshd\[26015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.171.237 user=root |
2019-10-22 22:45:28 |
| 45.136.110.16 | attack | 10/22/2019-10:08:15.164224 45.136.110.16 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-22 22:30:48 |
| 128.199.142.138 | attack | Oct 20 23:01:42 odroid64 sshd\[19479\]: Invalid user casey from 128.199.142.138 Oct 20 23:01:42 odroid64 sshd\[19479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138 Oct 20 23:01:44 odroid64 sshd\[19479\]: Failed password for invalid user casey from 128.199.142.138 port 57106 ssh2 ... |
2019-10-22 23:05:35 |
| 178.242.186.157 | attackspambots | Automatic report - Port Scan Attack |
2019-10-22 23:15:54 |
| 218.92.0.211 | attackspambots | Oct 22 16:08:08 eventyay sshd[10473]: Failed password for root from 218.92.0.211 port 47852 ssh2 Oct 22 16:08:39 eventyay sshd[10487]: Failed password for root from 218.92.0.211 port 60753 ssh2 ... |
2019-10-22 22:30:21 |