City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.50.146.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.50.146.116.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:19:59 CST 2025
;; MSG SIZE  rcvd: 107
        116.146.50.109.in-addr.arpa domain name pointer a109-50-146-116.cpe.netcabo.pt.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
116.146.50.109.in-addr.arpa	name = a109-50-146-116.cpe.netcabo.pt.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 106.12.18.37 | attackspambots | Jul 24 17:50:24 animalibera sshd[16224]: Invalid user uu from 106.12.18.37 port 45740 ...  | 
                    2019-07-25 02:02:36 | 
| 101.95.188.178 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-25/07-24]23pkt,1pt.(tcp)  | 
                    2019-07-25 01:20:18 | 
| 185.108.157.90 | attackspambots | Jul 25 02:06:16 our-server-hostname postfix/smtpd[17494]: connect from unknown[185.108.157.90] Jul 25 02:06:17 our-server-hostname postfix/smtpd[26218]: connect from unknown[185.108.157.90] Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=185.108.157.90  | 
                    2019-07-25 01:31:52 | 
| 129.150.170.136 | attackspam | 3389/tcp 3389/tcp 3389/tcp... [2019-06-23/07-24]22pkt,1pt.(tcp)  | 
                    2019-07-25 00:57:20 | 
| 104.215.78.27 | attackspam | Triggered by Fail2Ban at Ares web server  | 
                    2019-07-25 01:40:37 | 
| 118.69.214.116 | attackspam | 445/tcp 445/tcp 445/tcp... [2019-06-17/07-24]5pkt,1pt.(tcp)  | 
                    2019-07-25 01:09:23 | 
| 81.22.45.219 | attackspam | Honeypot attack, port: 81, PTR: PTR record not found  | 
                    2019-07-25 01:49:18 | 
| 180.250.149.227 | attackbotsspam | WordPress wp-login brute force :: 180.250.149.227 0.068 BYPASS [25/Jul/2019:02:46:43 1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2019-07-25 02:03:37 | 
| 77.247.110.234 | attackspam | \[2019-07-24 12:59:00\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-24T12:59:00.144-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="2019390237920793",SessionID="0x7f06f804c2c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.234/5060",ACLName="no_extension_match" \[2019-07-24 13:01:05\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-24T13:01:05.930-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="2020390237920793",SessionID="0x7f06f8009f28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.234/5060",ACLName="no_extension_match" \[2019-07-24 13:03:36\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-24T13:03:36.070-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1510390237920793",SessionID="0x7f06f83e80f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.234/5060",ACLName="  | 
                    2019-07-25 01:20:52 | 
| 198.98.60.40 | attackbotsspam | Jul 24 18:47:02 km20725 sshd\[4974\]: Failed password for root from 198.98.60.40 port 50366 ssh2Jul 24 18:47:05 km20725 sshd\[4974\]: Failed password for root from 198.98.60.40 port 50366 ssh2Jul 24 18:47:08 km20725 sshd\[4974\]: Failed password for root from 198.98.60.40 port 50366 ssh2Jul 24 18:47:11 km20725 sshd\[4974\]: Failed password for root from 198.98.60.40 port 50366 ssh2 ...  | 
                    2019-07-25 01:36:31 | 
| 193.169.5.14 | attackbots | SPF Fail sender not permitted to send mail for @svsreut.ru / Mail sent to address obtained from MySpace hack  | 
                    2019-07-25 01:49:57 | 
| 158.69.192.239 | attack | $f2bV_matches  | 
                    2019-07-25 01:48:32 | 
| 117.0.35.153 | attackbots | Jul 24 18:47:43 tuxlinux sshd[4929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153 user=root Jul 24 18:47:46 tuxlinux sshd[4929]: Failed password for root from 117.0.35.153 port 55552 ssh2 Jul 24 18:47:43 tuxlinux sshd[4929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153 user=root Jul 24 18:47:46 tuxlinux sshd[4929]: Failed password for root from 117.0.35.153 port 55552 ssh2 Jul 24 18:47:50 tuxlinux sshd[4934]: Invalid user admin from 117.0.35.153 port 53790 Jul 24 18:47:50 tuxlinux sshd[4934]: Invalid user admin from 117.0.35.153 port 53790 Jul 24 18:47:50 tuxlinux sshd[4934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153 ...  | 
                    2019-07-25 01:01:55 | 
| 185.222.211.237 | attack | Jul 24 18:47:01 lumpi kernel: INPUT:DROP:SPAMHAUS_DROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.222.211.237 DST=172.31.1.100 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=42030 DF PROTO=TCP SPT=24060 DPT=25 WINDOW=7300 RES=0x00 SYN URGP=0 ...  | 
                    2019-07-25 01:47:26 | 
| 160.242.192.104 | attack | 445/tcp 445/tcp 445/tcp... [2019-06-06/07-24]15pkt,1pt.(tcp)  | 
                    2019-07-25 01:31:19 |