City: Turin
Region: Piedmont
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.91.28.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.91.28.114. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 16:21:59 CST 2025
;; MSG SIZE rcvd: 105
114.28.91.94.in-addr.arpa domain name pointer host-94-91-28-114.business.telecomitalia.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
114.28.91.94.in-addr.arpa name = host-94-91-28-114.business.telecomitalia.it.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.181.168.184 | attackbots | (From Knop75883@gmail.com) Good evening, I was just taking a look at your website and submitted this message via your "contact us" form. The "contact us" page on your site sends you messages like this to your email account which is why you're reading through my message at this moment right? This is the most important achievement with any type of online ad, getting people to actually READ your ad and I did that just now with you! If you have an ad message you would like to promote to thousands of websites via their contact forms in the U.S. or to any country worldwide send me a quick note now, I can even target your required niches and my pricing is very low. Write a reply here: destineylylazo75@gmail.com |
2020-07-23 17:21:10 |
| 159.65.77.254 | attack | Jul 23 15:32:28 webhost01 sshd[6553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.77.254 Jul 23 15:32:30 webhost01 sshd[6553]: Failed password for invalid user aida from 159.65.77.254 port 40350 ssh2 ... |
2020-07-23 16:48:43 |
| 106.13.52.107 | attack | Jul 23 09:06:28 l03 sshd[25736]: Invalid user jochen from 106.13.52.107 port 45506 ... |
2020-07-23 17:06:36 |
| 118.69.71.182 | attackbots | Jul 23 14:04:00 dhoomketu sshd[1785357]: Invalid user adam from 118.69.71.182 port 10389 Jul 23 14:04:00 dhoomketu sshd[1785357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.71.182 Jul 23 14:04:00 dhoomketu sshd[1785357]: Invalid user adam from 118.69.71.182 port 10389 Jul 23 14:04:03 dhoomketu sshd[1785357]: Failed password for invalid user adam from 118.69.71.182 port 10389 ssh2 Jul 23 14:06:55 dhoomketu sshd[1785370]: Invalid user admin from 118.69.71.182 port 55690 ... |
2020-07-23 16:49:01 |
| 119.28.227.159 | attackspambots | 2020-07-23T13:32:09.058346billing sshd[12165]: Invalid user ws from 119.28.227.159 port 37620 2020-07-23T13:32:11.058840billing sshd[12165]: Failed password for invalid user ws from 119.28.227.159 port 37620 ssh2 2020-07-23T13:41:14.146103billing sshd[415]: Invalid user james from 119.28.227.159 port 39288 ... |
2020-07-23 16:54:29 |
| 59.41.92.190 | attackspam | 2020-07-22T23:02:49.467917morrigan.ad5gb.com sshd[1207451]: Invalid user toby from 59.41.92.190 port 15389 2020-07-22T23:02:51.750582morrigan.ad5gb.com sshd[1207451]: Failed password for invalid user toby from 59.41.92.190 port 15389 ssh2 |
2020-07-23 17:17:57 |
| 211.253.27.146 | attack | sshd: Failed password for invalid user .... from 211.253.27.146 port 37560 ssh2 (6 attempts) |
2020-07-23 17:17:24 |
| 51.195.138.52 | attack | Jul 23 09:52:08 rocket sshd[9090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.138.52 Jul 23 09:52:11 rocket sshd[9090]: Failed password for invalid user investor from 51.195.138.52 port 37308 ssh2 Jul 23 09:56:24 rocket sshd[9705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.138.52 ... |
2020-07-23 16:57:50 |
| 182.61.46.245 | attack | Jul 23 06:08:30 ip-172-31-62-245 sshd\[18988\]: Invalid user postgres from 182.61.46.245\ Jul 23 06:08:32 ip-172-31-62-245 sshd\[18988\]: Failed password for invalid user postgres from 182.61.46.245 port 40984 ssh2\ Jul 23 06:10:29 ip-172-31-62-245 sshd\[19070\]: Invalid user natalia from 182.61.46.245\ Jul 23 06:10:32 ip-172-31-62-245 sshd\[19070\]: Failed password for invalid user natalia from 182.61.46.245 port 32814 ssh2\ Jul 23 06:12:19 ip-172-31-62-245 sshd\[19104\]: Invalid user developer from 182.61.46.245\ |
2020-07-23 16:44:04 |
| 200.229.193.149 | attackbotsspam | Automatic Fail2ban report - Trying login SSH |
2020-07-23 17:12:30 |
| 91.191.147.101 | attackbots | [ThuJul2310:13:40.5307402020][:error][pid14230:tid139903453071104][client91.191.147.101:37464][client91.191.147.101]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:n\(\?:-stealth\|sauditor\|e\(\?:ssus\|etwork-services-auditor\)\|ikto\|map\)\|b\(\?:lack\?widow\|rutus\|ilbo\)\|web\(\?:inspec\|roo\)t\|p\(\?:mafind\|aros\|avuk\)\|cgichk\|jaascois\|\\\\\\\\.nasl\|metis\|w\(\?:ebtrendssecurityanalyzer\|hcc\|3af\\\\\\\\.sourceforge\\\\\\\\.net\)\|\\\\\\\\bzmeu\\\\\\\\b\|springenwerk\|..."atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"193"][id"330034"][rev"12"][msg"Atomicorp.comWAFRules:UnauthorizedVulnerabilityScannerdetected"][data"nmap"][severity"CRITICAL"][hostname"148.251.104.72"][uri"/200"][unique_id"XxlGtAl0ekS9B7hWjy4cLwAAAIc"][ThuJul2310:13:40.5315572020][:error][pid14493:tid139903411111680][client91.191.147.101:55092][client91.191.147.101]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:n\(\?:-ste |
2020-07-23 16:47:18 |
| 203.178.148.19 | attackbots | srv02 Mass scanning activity detected Target: - .. |
2020-07-23 16:46:23 |
| 203.81.78.180 | attackbots | Jul 23 05:53:41 h2427292 sshd\[8271\]: Invalid user windows from 203.81.78.180 Jul 23 05:53:41 h2427292 sshd\[8271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.81.78.180 Jul 23 05:53:43 h2427292 sshd\[8271\]: Failed password for invalid user windows from 203.81.78.180 port 46938 ssh2 ... |
2020-07-23 17:04:47 |
| 185.132.53.10 | attackbotsspam | Jul 23 08:13:55 dcd-gentoo sshd[2971]: Invalid user 194.146.50.83 from 185.132.53.10 port 48770 Jul 23 08:13:55 dcd-gentoo sshd[2976]: Invalid user 194.146.50.83 from 185.132.53.10 port 50064 Jul 23 08:14:00 dcd-gentoo sshd[2980]: Invalid user 194.146.50.83 from 185.132.53.10 port 57766 ... |
2020-07-23 17:00:43 |
| 103.114.221.16 | attackbotsspam | Invalid user app from 103.114.221.16 port 38522 |
2020-07-23 16:50:55 |