City: Itapecerica
Region: Minas Gerais
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.99.243.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.99.243.95. IN A
;; AUTHORITY SECTION:
. 545 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:01:43 CST 2022
;; MSG SIZE rcvd: 106
95.243.99.138.in-addr.arpa domain name pointer 138-99-243-95.sempre.tec.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
95.243.99.138.in-addr.arpa name = 138-99-243-95.sempre.tec.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 2.47.136.66 | attackspambots | Honeypot attack, port: 445, PTR: net-2-47-136-66.cust.vodafonedsl.it. |
2020-09-04 19:17:47 |
| 61.247.178.170 | attackspambots | 2020-07-25 02:43:09,364 fail2ban.actions [18606]: NOTICE [sshd] Ban 61.247.178.170 2020-07-25 03:02:45,389 fail2ban.actions [18606]: NOTICE [sshd] Ban 61.247.178.170 2020-07-25 03:18:16,501 fail2ban.actions [18606]: NOTICE [sshd] Ban 61.247.178.170 2020-07-25 03:33:48,153 fail2ban.actions [18606]: NOTICE [sshd] Ban 61.247.178.170 2020-07-25 03:49:20,225 fail2ban.actions [18606]: NOTICE [sshd] Ban 61.247.178.170 ... |
2020-09-04 19:27:18 |
| 180.76.107.10 | attackspambots | Sep 4 11:33:37 cho sshd[2211676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.107.10 Sep 4 11:33:37 cho sshd[2211676]: Invalid user courier from 180.76.107.10 port 35574 Sep 4 11:33:39 cho sshd[2211676]: Failed password for invalid user courier from 180.76.107.10 port 35574 ssh2 Sep 4 11:38:19 cho sshd[2211896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.107.10 user=root Sep 4 11:38:21 cho sshd[2211896]: Failed password for root from 180.76.107.10 port 39858 ssh2 ... |
2020-09-04 19:51:48 |
| 106.13.71.1 | attackspambots | 2020-07-27 18:53:44,650 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 2020-07-27 19:08:04,552 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 2020-07-27 19:22:17,060 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 2020-07-27 19:36:01,044 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 2020-07-27 19:49:11,834 fail2ban.actions [18606]: NOTICE [sshd] Ban 106.13.71.1 ... |
2020-09-04 19:18:56 |
| 213.234.242.155 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-04 19:47:41 |
| 186.116.81.104 | attackspambots | Unauthorised access (Sep 3) SRC=186.116.81.104 LEN=52 TOS=0x10 PREC=0x40 TTL=115 ID=11079 DF TCP DPT=445 WINDOW=8192 SYN |
2020-09-04 19:49:47 |
| 180.101.145.234 | attackspambots | 2020-09-04 dovecot_login authenticator failed for \(User\) \[180.101.145.234\]: 535 Incorrect authentication data \(set_id=games@**REMOVED**\) 2020-09-04 dovecot_login authenticator failed for \(User\) \[180.101.145.234\]: 535 Incorrect authentication data \(set_id=games@**REMOVED**\) 2020-09-04 dovecot_login authenticator failed for \(User\) \[180.101.145.234\]: 535 Incorrect authentication data \(set_id=games@**REMOVED**\) |
2020-09-04 19:37:08 |
| 118.25.114.245 | attack | Time: Fri Sep 4 01:37:49 2020 +0000 IP: 118.25.114.245 (CN/China/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 4 01:26:57 pv-14-ams2 sshd[9541]: Invalid user dmh from 118.25.114.245 port 49940 Sep 4 01:26:59 pv-14-ams2 sshd[9541]: Failed password for invalid user dmh from 118.25.114.245 port 49940 ssh2 Sep 4 01:32:25 pv-14-ams2 sshd[27637]: Invalid user sjj from 118.25.114.245 port 49612 Sep 4 01:32:26 pv-14-ams2 sshd[27637]: Failed password for invalid user sjj from 118.25.114.245 port 49612 ssh2 Sep 4 01:37:43 pv-14-ams2 sshd[12590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.114.245 user=root |
2020-09-04 19:53:36 |
| 141.156.198.128 | attackbotsspam | Sep 3 18:13:45 kunden sshd[19183]: Address 141.156.198.128 maps to pool-141-156-198-128.washdc.fios.verizon.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 3 18:13:45 kunden sshd[19183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.156.198.128 user=r.r Sep 3 18:13:47 kunden sshd[19183]: Failed password for r.r from 141.156.198.128 port 33418 ssh2 Sep 3 18:13:49 kunden sshd[19183]: Failed password for r.r from 141.156.198.128 port 33418 ssh2 Sep 3 18:13:52 kunden sshd[19183]: Failed password for r.r from 141.156.198.128 port 33418 ssh2 Sep 3 18:13:54 kunden sshd[19183]: Failed password for r.r from 141.156.198.128 port 33418 ssh2 Sep 3 18:13:57 kunden sshd[19183]: Failed password for r.r from 141.156.198.128 port 33418 ssh2 Sep 3 18:13:59 kunden sshd[19183]: Failed password for r.r from 141.156.198.128 port 33418 ssh2 Sep 3 18:13:59 kunden sshd[19183]: PAM 5 more authentication failu........ ------------------------------- |
2020-09-04 19:50:29 |
| 94.132.0.248 | attackspambots | SMB Server BruteForce Attack |
2020-09-04 19:36:01 |
| 36.88.15.207 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-04 19:33:59 |
| 139.99.219.208 | attackspambots | Invalid user wanglj from 139.99.219.208 port 58809 |
2020-09-04 19:45:06 |
| 41.92.107.180 | attackspam | Sep 3 18:42:22 mellenthin postfix/smtpd[19910]: NOQUEUE: reject: RCPT from unknown[41.92.107.180]: 554 5.7.1 Service unavailable; Client host [41.92.107.180] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/41.92.107.180; from= |
2020-09-04 19:56:49 |
| 200.229.193.149 | attackspam | $f2bV_matches |
2020-09-04 19:51:31 |
| 123.180.60.235 | attackspambots | Sep 3 17:32:18 nirvana postfix/smtpd[31178]: connect from unknown[123.180.60.235] Sep 3 17:32:18 nirvana postfix/smtpd[31178]: lost connection after EHLO from unknown[123.180.60.235] Sep 3 17:32:18 nirvana postfix/smtpd[31178]: disconnect from unknown[123.180.60.235] Sep 3 17:35:46 nirvana postfix/smtpd[24554]: connect from unknown[123.180.60.235] Sep 3 17:35:46 nirvana postfix/smtpd[24554]: lost connection after CONNECT from unknown[123.180.60.235] Sep 3 17:35:46 nirvana postfix/smtpd[24554]: disconnect from unknown[123.180.60.235] Sep 3 17:39:15 nirvana postfix/smtpd[25407]: connect from unknown[123.180.60.235] Sep 3 17:39:15 nirvana postfix/smtpd[25407]: warning: unknown[123.180.60.235]: SASL LOGIN authentication failed: authentication failure Sep 3 17:39:17 nirvana postfix/smtpd[25407]: warning: unknown[123.180.60.235]: SASL LOGIN authentication failed: authentication failure Sep 3 17:39:19 nirvana postfix/smtpd[25407]: warning: unknown[123.180.60.235]: SA........ ------------------------------- |
2020-09-04 19:45:58 |