City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.42.14.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.42.14.63. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:16:09 CST 2025
;; MSG SIZE rcvd: 104
63.14.42.85.in-addr.arpa domain name pointer host-85-42-14-63.business.telecomitalia.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
63.14.42.85.in-addr.arpa name = host-85-42-14-63.business.telecomitalia.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.243.128.177 | attackbots | Port scan: Attack repeated for 24 hours |
2020-04-09 07:49:29 |
| 177.104.251.122 | attack | k+ssh-bruteforce |
2020-04-09 07:43:00 |
| 123.232.44.122 | attackbotsspam | RDP Brute-Force |
2020-04-09 07:53:42 |
| 49.148.244.202 | attackspam | illegal hacking into Ubisoft with compromised details |
2020-04-09 07:26:18 |
| 54.37.229.128 | attack | Apr 9 01:06:46 h1745522 sshd[27802]: Invalid user deploy from 54.37.229.128 port 47324 Apr 9 01:06:46 h1745522 sshd[27802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.229.128 Apr 9 01:06:46 h1745522 sshd[27802]: Invalid user deploy from 54.37.229.128 port 47324 Apr 9 01:06:48 h1745522 sshd[27802]: Failed password for invalid user deploy from 54.37.229.128 port 47324 ssh2 Apr 9 01:10:07 h1745522 sshd[28067]: Invalid user bernard from 54.37.229.128 port 55494 Apr 9 01:10:07 h1745522 sshd[28067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.229.128 Apr 9 01:10:07 h1745522 sshd[28067]: Invalid user bernard from 54.37.229.128 port 55494 Apr 9 01:10:10 h1745522 sshd[28067]: Failed password for invalid user bernard from 54.37.229.128 port 55494 ssh2 Apr 9 01:13:16 h1745522 sshd[31055]: Invalid user ubuntu from 54.37.229.128 port 35428 ... |
2020-04-09 07:40:30 |
| 45.254.25.62 | attackbots | Brute-force attempt banned |
2020-04-09 07:30:53 |
| 120.194.108.100 | attackbotsspam | 20/4/8@17:49:12: FAIL: Alarm-SSH address from=120.194.108.100 ... |
2020-04-09 07:54:05 |
| 86.69.2.215 | attack | Apr 8 22:14:10 game-panel sshd[31492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.69.2.215 Apr 8 22:14:12 game-panel sshd[31492]: Failed password for invalid user sergey from 86.69.2.215 port 40408 ssh2 Apr 8 22:16:27 game-panel sshd[31607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.69.2.215 |
2020-04-09 07:50:04 |
| 178.62.33.138 | attackbotsspam | Apr 8 21:49:33 ws26vmsma01 sshd[35960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138 Apr 8 21:49:35 ws26vmsma01 sshd[35960]: Failed password for invalid user vboxuser from 178.62.33.138 port 58502 ssh2 ... |
2020-04-09 07:26:01 |
| 163.125.179.161 | attack | Unauthorized connection attempt detected from IP address 163.125.179.161 to port 1433 |
2020-04-09 07:53:03 |
| 103.84.63.5 | attackbotsspam | 2020-04-09T01:26:01.774956cyberdyne sshd[444577]: Invalid user prog from 103.84.63.5 port 37658 2020-04-09T01:26:01.780391cyberdyne sshd[444577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.63.5 2020-04-09T01:26:01.774956cyberdyne sshd[444577]: Invalid user prog from 103.84.63.5 port 37658 2020-04-09T01:26:04.139983cyberdyne sshd[444577]: Failed password for invalid user prog from 103.84.63.5 port 37658 ssh2 ... |
2020-04-09 07:35:44 |
| 125.189.52.194 | attackspam | no |
2020-04-09 07:23:00 |
| 122.51.242.122 | attack | 2020-04-08T23:38:09.786440ns386461 sshd\[26679\]: Invalid user jboss from 122.51.242.122 port 46622 2020-04-08T23:38:09.790875ns386461 sshd\[26679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.242.122 2020-04-08T23:38:11.658520ns386461 sshd\[26679\]: Failed password for invalid user jboss from 122.51.242.122 port 46622 ssh2 2020-04-08T23:52:43.746959ns386461 sshd\[7446\]: Invalid user cod2 from 122.51.242.122 port 59370 2020-04-08T23:52:43.751430ns386461 sshd\[7446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.242.122 ... |
2020-04-09 07:28:27 |
| 222.186.173.215 | attackbots | Apr 9 01:40:36 odroid64 sshd\[1619\]: User root from 222.186.173.215 not allowed because not listed in AllowUsers Apr 9 01:40:37 odroid64 sshd\[1619\]: Failed none for invalid user root from 222.186.173.215 port 53408 ssh2 ... |
2020-04-09 07:45:31 |
| 45.71.208.253 | attackbotsspam | SASL PLAIN auth failed: ruser=... |
2020-04-09 07:48:58 |