City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.69.97.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62645
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.69.97.66. IN A
;; AUTHORITY SECTION:
. 597 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:31:39 CST 2022
;; MSG SIZE rcvd: 105
66.97.69.148.in-addr.arpa domain name pointer 66.97.69.148.rev.vodafone.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.97.69.148.in-addr.arpa name = 66.97.69.148.rev.vodafone.pt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 194.141.2.248 | attackbotsspam | 2019-11-09T09:11:26.607366abusebot-2.cloudsearch.cf sshd\[12793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.141.2.248 user=root |
2019-11-09 22:13:01 |
| 128.199.137.252 | attackspam | Nov 9 09:41:28 legacy sshd[8714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.252 Nov 9 09:41:30 legacy sshd[8714]: Failed password for invalid user system from 128.199.137.252 port 58276 ssh2 Nov 9 09:48:47 legacy sshd[8934]: Failed password for root from 128.199.137.252 port 39776 ssh2 ... |
2019-11-09 22:02:53 |
| 45.143.220.60 | attackspam | \[2019-11-09 06:01:13\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T06:01:13.564-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146243343011",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.60/5076",ACLName="no_extension_match" \[2019-11-09 06:05:18\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T06:05:18.352-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="801146243343011",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.60/5100",ACLName="no_extension_match" \[2019-11-09 06:09:21\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T06:09:21.432-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146243343011",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.60/5116",ACLName="no_extensi |
2019-11-09 21:54:28 |
| 212.129.134.208 | attackbotsspam | Nov 9 07:56:07 ws19vmsma01 sshd[111604]: Failed password for root from 212.129.134.208 port 48992 ssh2 ... |
2019-11-09 22:02:26 |
| 140.143.236.53 | attackbots | 2019-11-09T11:40:25.497563abusebot-5.cloudsearch.cf sshd\[12208\]: Invalid user cen from 140.143.236.53 port 57625 |
2019-11-09 22:13:14 |
| 211.252.19.254 | attackspam | Nov 9 12:17:14 XXX sshd[56872]: Invalid user ofsaa from 211.252.19.254 port 56486 |
2019-11-09 22:06:17 |
| 193.56.28.177 | attackspam | SPAM Delivery Attempt |
2019-11-09 22:14:29 |
| 151.80.75.127 | attackspam | Nov 9 13:44:40 postfix/smtpd: warning: unknown[151.80.75.127]: SASL LOGIN authentication failed |
2019-11-09 21:56:41 |
| 42.51.204.24 | attackbots | Nov 9 10:27:44 MK-Soft-VM5 sshd[7924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.204.24 Nov 9 10:27:47 MK-Soft-VM5 sshd[7924]: Failed password for invalid user dengw123 from 42.51.204.24 port 54205 ssh2 ... |
2019-11-09 22:11:58 |
| 85.14.94.150 | attackbots | Joomla Admin : try to force the door... |
2019-11-09 22:03:32 |
| 185.153.208.26 | attack | Nov 9 10:00:48 firewall sshd[9011]: Invalid user salim from 185.153.208.26 Nov 9 10:00:50 firewall sshd[9011]: Failed password for invalid user salim from 185.153.208.26 port 57212 ssh2 Nov 9 10:05:06 firewall sshd[9115]: Invalid user unloose from 185.153.208.26 ... |
2019-11-09 22:02:00 |
| 91.121.103.175 | attackbots | $f2bV_matches |
2019-11-09 22:12:42 |
| 58.254.132.239 | attackbots | " " |
2019-11-09 22:01:31 |
| 112.94.2.65 | attack | Nov 9 14:01:17 nextcloud sshd\[6210\]: Invalid user grimsby from 112.94.2.65 Nov 9 14:01:17 nextcloud sshd\[6210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.94.2.65 Nov 9 14:01:19 nextcloud sshd\[6210\]: Failed password for invalid user grimsby from 112.94.2.65 port 52673 ssh2 ... |
2019-11-09 21:57:33 |
| 167.114.25.247 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/167.114.25.247/ FR - 1H : (40) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : FR NAME ASN : ASN16276 IP : 167.114.25.247 CIDR : 167.114.0.0/17 PREFIX COUNT : 132 UNIQUE IP COUNT : 3052544 ATTACKS DETECTED ASN16276 : 1H - 1 3H - 1 6H - 5 12H - 9 24H - 20 DateTime : 2019-11-09 07:18:20 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-11-09 22:08:48 |