City: Belo Horizonte
Region: Minas Gerais
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.164.243.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.164.243.46. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 18:41:34 CST 2025
;; MSG SIZE rcvd: 107
46.243.164.150.in-addr.arpa domain name pointer 46-243-164-150.rsf.ufmg.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
46.243.164.150.in-addr.arpa name = 46-243-164-150.rsf.ufmg.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 118.24.18.226 | attack | Invalid user postgre from 118.24.18.226 port 55796 |
2020-07-12 01:59:50 |
| 79.249.253.221 | attackbotsspam | 2020-07-11T15:48:44.583632abusebot-6.cloudsearch.cf sshd[8312]: Invalid user pi from 79.249.253.221 port 39592 2020-07-11T15:48:44.641258abusebot-6.cloudsearch.cf sshd[8313]: Invalid user pi from 79.249.253.221 port 39596 2020-07-11T15:48:44.703355abusebot-6.cloudsearch.cf sshd[8312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=p4ff9fddd.dip0.t-ipconnect.de 2020-07-11T15:48:44.583632abusebot-6.cloudsearch.cf sshd[8312]: Invalid user pi from 79.249.253.221 port 39592 2020-07-11T15:48:46.450699abusebot-6.cloudsearch.cf sshd[8312]: Failed password for invalid user pi from 79.249.253.221 port 39592 ssh2 2020-07-11T15:48:44.760819abusebot-6.cloudsearch.cf sshd[8313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=p4ff9fddd.dip0.t-ipconnect.de 2020-07-11T15:48:44.641258abusebot-6.cloudsearch.cf sshd[8313]: Invalid user pi from 79.249.253.221 port 39596 2020-07-11T15:48:46.545783abusebot-6.cloudsearch.cf sshd ... |
2020-07-12 02:09:13 |
| 138.255.148.35 | attack | 2020-07-11T17:43:30.500696shield sshd\[13033\]: Invalid user pranava from 138.255.148.35 port 52100 2020-07-11T17:43:30.514973shield sshd\[13033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.148.255.138.clicfacilitb.com.br 2020-07-11T17:43:32.494799shield sshd\[13033\]: Failed password for invalid user pranava from 138.255.148.35 port 52100 ssh2 2020-07-11T17:47:40.302110shield sshd\[14197\]: Invalid user yook from 138.255.148.35 port 50512 2020-07-11T17:47:40.312014shield sshd\[14197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.148.255.138.clicfacilitb.com.br |
2020-07-12 01:54:10 |
| 129.204.245.6 | attackspambots | Invalid user ns08 from 129.204.245.6 port 45630 |
2020-07-12 01:54:30 |
| 79.172.217.79 | attackbotsspam | SSH invalid-user multiple login try |
2020-07-12 02:09:45 |
| 107.174.46.67 | attackbotsspam | (sshd) Failed SSH login from 107.174.46.67 (US/United States/107-174-46-67-host.colocrossing.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 11 19:04:22 amsweb01 sshd[20916]: Did not receive identification string from 107.174.46.67 port 42532 Jul 11 19:04:34 amsweb01 sshd[20931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.174.46.67 user=root Jul 11 19:04:36 amsweb01 sshd[20931]: Failed password for root from 107.174.46.67 port 56254 ssh2 Jul 11 19:04:43 amsweb01 sshd[20935]: Invalid user oracle from 107.174.46.67 port 33884 Jul 11 19:04:45 amsweb01 sshd[20935]: Failed password for invalid user oracle from 107.174.46.67 port 33884 ssh2 |
2020-07-12 02:02:16 |
| 200.54.170.198 | attackbots | Jul 11 18:40:15 OPSO sshd\[26600\]: Invalid user guinevre from 200.54.170.198 port 43732 Jul 11 18:40:15 OPSO sshd\[26600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.170.198 Jul 11 18:40:18 OPSO sshd\[26600\]: Failed password for invalid user guinevre from 200.54.170.198 port 43732 ssh2 Jul 11 18:46:30 OPSO sshd\[27891\]: Invalid user mouse from 200.54.170.198 port 56148 Jul 11 18:46:30 OPSO sshd\[27891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.170.198 |
2020-07-12 01:43:03 |
| 103.125.154.162 | attack | Jul 11 10:41:36 logopedia-1vcpu-1gb-nyc1-01 sshd[130429]: Invalid user zoe from 103.125.154.162 port 34468 ... |
2020-07-12 02:06:24 |
| 122.224.131.116 | attackspambots | Jul 11 14:53:56 vps46666688 sshd[28275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.131.116 Jul 11 14:53:57 vps46666688 sshd[28275]: Failed password for invalid user sharan from 122.224.131.116 port 53248 ssh2 ... |
2020-07-12 01:56:00 |
| 185.117.118.34 | attack | Unauthorized connection attempt detected from IP address 185.117.118.34 to port 22 |
2020-07-12 01:47:20 |
| 5.3.6.82 | attackbots | 5x Failed Password |
2020-07-12 02:17:03 |
| 120.92.114.71 | attackspam | Failed password for invalid user Dakota from 120.92.114.71 port 25092 ssh2 |
2020-07-12 01:57:14 |
| 197.51.119.218 | attackbots | Invalid user julian from 197.51.119.218 port 41594 |
2020-07-12 01:45:21 |
| 178.128.150.158 | attackspam | Jul 11 18:54:11 lnxded63 sshd[21477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158 |
2020-07-12 01:48:54 |
| 106.51.78.18 | attack | Jul 11 16:32:49 plex-server sshd[285078]: Invalid user sjt from 106.51.78.18 port 51016 Jul 11 16:32:49 plex-server sshd[285078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.78.18 Jul 11 16:32:49 plex-server sshd[285078]: Invalid user sjt from 106.51.78.18 port 51016 Jul 11 16:32:51 plex-server sshd[285078]: Failed password for invalid user sjt from 106.51.78.18 port 51016 ssh2 Jul 11 16:36:15 plex-server sshd[285363]: Invalid user capture from 106.51.78.18 port 47608 ... |
2020-07-12 02:02:58 |