City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.150.105.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29946
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.150.105.68. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 05:04:42 CST 2025
;; MSG SIZE rcvd: 106
68.105.150.93.in-addr.arpa domain name pointer net-93-150-105-68.cust.vodafonedsl.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.105.150.93.in-addr.arpa name = net-93-150-105-68.cust.vodafonedsl.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.42.116.22 | attack | Jul 9 15:40:59 ns341937 sshd[14718]: Failed password for root from 192.42.116.22 port 55856 ssh2 Jul 9 15:41:01 ns341937 sshd[14718]: Failed password for root from 192.42.116.22 port 55856 ssh2 Jul 9 15:41:03 ns341937 sshd[14718]: Failed password for root from 192.42.116.22 port 55856 ssh2 Jul 9 15:41:05 ns341937 sshd[14718]: Failed password for root from 192.42.116.22 port 55856 ssh2 ... |
2019-07-10 00:07:58 |
| 139.209.135.101 | attack | firewall-block, port(s): 23/tcp |
2019-07-10 00:44:28 |
| 221.125.165.59 | attack | web-1 [ssh] SSH Attack |
2019-07-09 23:57:22 |
| 92.51.242.62 | attackspambots | #11022 - [92.51.242.62] Error: 550 5.7.1 Forged HELO hostname detected #11022 - [92.51.242.62] Error: 550 5.7.1 Forged HELO hostname detected #11022 - [92.51.242.62] Error: 550 5.7.1 Forged HELO hostname detected #11022 - [92.51.242.62] Error: 550 5.7.1 Forged HELO hostname detected ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=92.51.242.62 |
2019-07-09 23:35:50 |
| 81.22.45.239 | attack | 09.07.2019 15:22:32 Connection to port 9832 blocked by firewall |
2019-07-10 00:05:50 |
| 185.86.164.109 | attackbots | WordPress login Brute force / Web App Attack on client site. |
2019-07-09 23:37:17 |
| 66.55.69.78 | attack | 2019-07-09 15:38:36 H=pm4.cn (foxtechfpv.com) [66.55.69.78] F= |
2019-07-09 23:55:56 |
| 177.2.149.228 | attackspambots | SS5,WP GET /wp-login.php |
2019-07-10 00:46:29 |
| 179.128.75.203 | attackbots | Jul 9 15:22:29 srv1 sshd[29068]: Address 179.128.75.203 maps to 179-128-75-203.user.vivozap.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 9 15:22:30 srv1 sshd[29068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.128.75.203 user=r.r Jul 9 15:22:31 srv1 sshd[29068]: Failed password for r.r from 179.128.75.203 port 35132 ssh2 Jul 9 15:22:32 srv1 sshd[29069]: Received disconnect from 179.128.75.203: 11: Bye Bye Jul 9 15:22:34 srv1 sshd[29070]: Address 179.128.75.203 maps to 179-128-75-203.user.vivozap.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 9 15:22:34 srv1 sshd[29070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.128.75.203 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=179.128.75.203 |
2019-07-09 23:19:46 |
| 83.111.151.245 | attackspambots | Jul 9 11:47:19 server sshd\[180170\]: Invalid user toor from 83.111.151.245 Jul 9 11:47:19 server sshd\[180170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.111.151.245 Jul 9 11:47:21 server sshd\[180170\]: Failed password for invalid user toor from 83.111.151.245 port 39106 ssh2 ... |
2019-07-09 23:53:34 |
| 37.224.88.205 | attackbotsspam | SSH/22 MH Probe, BF, Hack - |
2019-07-10 00:22:17 |
| 43.249.192.59 | attackbots | 1433/tcp 8080/tcp 37215/tcp... [2019-05-08/07-09]47pkt,10pt.(tcp) |
2019-07-10 00:23:42 |
| 209.97.187.108 | attackspambots | Jul 9 18:14:38 mail sshd[23659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.187.108 user=root Jul 9 18:14:40 mail sshd[23659]: Failed password for root from 209.97.187.108 port 44852 ssh2 ... |
2019-07-10 00:32:37 |
| 61.3.61.197 | attackbotsspam | firewall-block, port(s): 5431/tcp |
2019-07-10 00:46:59 |
| 196.52.43.51 | attack | " " |
2019-07-10 00:39:51 |