City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.49.142.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61024
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.49.142.47.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 19:18:00 CST 2025
;; MSG SIZE  rcvd: 105
        47.142.49.93.in-addr.arpa domain name pointer 93-49-142-47.ip368.fastwebnet.it.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
47.142.49.93.in-addr.arpa	name = 93-49-142-47.ip368.fastwebnet.it.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 184.182.222.78 | attackspambots | RDP Bruteforce  | 
                    2019-11-03 03:14:45 | 
| 222.186.175.216 | attack | SSH Brute Force, server-1 sshd[580]: Failed password for root from 222.186.175.216 port 50294 ssh2  | 
                    2019-11-03 03:26:18 | 
| 106.75.118.145 | attack | Nov 2 19:51:04 sauna sshd[182247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.118.145 Nov 2 19:51:07 sauna sshd[182247]: Failed password for invalid user bestbusca from 106.75.118.145 port 34014 ssh2 ...  | 
                    2019-11-03 03:34:12 | 
| 64.61.73.9 | attackspam | WEB_SERVER 403 Forbidden  | 
                    2019-11-03 02:56:06 | 
| 97.107.141.188 | attackbots | WEB_SERVER 403 Forbidden  | 
                    2019-11-03 03:24:48 | 
| 141.226.1.11 | attack | Honeypot attack, port: 23, PTR: PTR record not found  | 
                    2019-11-03 03:13:33 | 
| 54.66.215.225 | attackspam | firewall-block, port(s): 1433/tcp  | 
                    2019-11-03 03:09:07 | 
| 222.82.156.20 | attack | Honeypot attack, port: 23, PTR: PTR record not found  | 
                    2019-11-03 03:23:25 | 
| 189.63.2.133 | attack | port 23 attempt blocked  | 
                    2019-11-03 03:29:15 | 
| 23.99.180.207 | attackspam | SMTP/25/465/587 Probe, BadAuth, SPAM, Hack -  | 
                    2019-11-03 03:11:10 | 
| 71.6.146.186 | attack | Unauthorized connection attempt from IP address 71.6.146.186 on Port 143(IMAP)  | 
                    2019-11-03 03:25:12 | 
| 117.206.69.231 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 02-11-2019 11:50:22.  | 
                    2019-11-03 02:53:12 | 
| 206.189.239.103 | attackbots | Invalid user jonatas from 206.189.239.103 port 35746  | 
                    2019-11-03 03:09:23 | 
| 189.41.135.64 | attack | Unauthorised access (Nov 2) SRC=189.41.135.64 LEN=40 TTL=238 ID=64833 TCP DPT=1433 WINDOW=1024 SYN  | 
                    2019-11-03 03:02:00 | 
| 45.45.45.45 | attackbotsspam | 02.11.2019 11:50:00 Recursive DNS scan  | 
                    2019-11-03 03:10:26 |