City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.238.145.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;160.238.145.42. IN A
;; AUTHORITY SECTION:
. 297 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022091500 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 23:05:54 CST 2022
;; MSG SIZE rcvd: 107
42.145.238.160.in-addr.arpa domain name pointer 160-238-145-42.clientes.azecom.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.145.238.160.in-addr.arpa name = 160-238-145-42.clientes.azecom.com.br.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
141.98.80.99 | attackspam | 2019-11-12T14:35:53.933334MailD postfix/smtpd[1405]: warning: unknown[141.98.80.99]: SASL PLAIN authentication failed: authentication failure 2019-11-12T14:35:55.166206MailD postfix/smtpd[1847]: warning: unknown[141.98.80.99]: SASL PLAIN authentication failed: authentication failure 2019-11-12T16:29:18.714204MailD postfix/smtpd[10559]: warning: unknown[141.98.80.99]: SASL PLAIN authentication failed: authentication failure |
2019-11-12 23:29:46 |
58.229.208.187 | attackspambots | $f2bV_matches |
2019-11-12 23:45:22 |
117.203.244.242 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-11-13 00:04:56 |
185.143.223.119 | attack | 2019-11-12T16:38:38.469027+01:00 lumpi kernel: [3395495.271907] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.119 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=25073 PROTO=TCP SPT=42147 DPT=35693 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-12 23:46:20 |
94.23.147.35 | attack | (mod_security) mod_security (id:949110) triggered by 94.23.147.35 (NL/Netherlands/ns1.gooof.de): 3 in the last 3600 secs |
2019-11-12 23:24:36 |
129.204.23.5 | attackspam | Nov 12 05:09:26 wbs sshd\[15628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.23.5 user=root Nov 12 05:09:28 wbs sshd\[15628\]: Failed password for root from 129.204.23.5 port 46618 ssh2 Nov 12 05:15:03 wbs sshd\[16079\]: Invalid user operator from 129.204.23.5 Nov 12 05:15:03 wbs sshd\[16079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.23.5 Nov 12 05:15:05 wbs sshd\[16079\]: Failed password for invalid user operator from 129.204.23.5 port 55484 ssh2 |
2019-11-12 23:25:20 |
119.29.129.237 | attack | Nov 12 16:24:11 meumeu sshd[19599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.129.237 Nov 12 16:24:12 meumeu sshd[19599]: Failed password for invalid user GDCN-iptv2008 from 119.29.129.237 port 56484 ssh2 Nov 12 16:29:39 meumeu sshd[24816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.129.237 ... |
2019-11-12 23:58:47 |
132.232.32.228 | attackspambots | Nov 12 15:04:28 game-panel sshd[8177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.228 Nov 12 15:04:30 game-panel sshd[8177]: Failed password for invalid user mishelle from 132.232.32.228 port 42766 ssh2 Nov 12 15:10:34 game-panel sshd[8421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.228 |
2019-11-12 23:28:35 |
222.186.169.192 | attackspambots | 2019-11-12T15:30:17.370626shield sshd\[27653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root 2019-11-12T15:30:19.289136shield sshd\[27653\]: Failed password for root from 222.186.169.192 port 9756 ssh2 2019-11-12T15:30:22.886069shield sshd\[27653\]: Failed password for root from 222.186.169.192 port 9756 ssh2 2019-11-12T15:30:25.701858shield sshd\[27653\]: Failed password for root from 222.186.169.192 port 9756 ssh2 2019-11-12T15:30:28.455818shield sshd\[27653\]: Failed password for root from 222.186.169.192 port 9756 ssh2 |
2019-11-12 23:38:42 |
139.59.169.103 | attackspam | $f2bV_matches |
2019-11-12 23:24:01 |
159.203.201.201 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-12 23:56:44 |
104.236.100.42 | attackspam | 104.236.100.42 - - \[12/Nov/2019:15:40:48 +0100\] "POST /wp-login.php HTTP/1.0" 200 5707 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.236.100.42 - - \[12/Nov/2019:15:40:49 +0100\] "POST /wp-login.php HTTP/1.0" 200 5707 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.236.100.42 - - \[12/Nov/2019:15:40:50 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 802 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-11-12 23:44:53 |
193.32.163.102 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-12 23:59:32 |
95.183.71.207 | attack | port scan and connect, tcp 23 (telnet) |
2019-11-13 00:00:11 |
93.92.138.3 | attack | Nov 12 16:25:17 markkoudstaal sshd[19032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.92.138.3 Nov 12 16:25:19 markkoudstaal sshd[19032]: Failed password for invalid user wwwadmin from 93.92.138.3 port 52506 ssh2 Nov 12 16:29:15 markkoudstaal sshd[19362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.92.138.3 |
2019-11-12 23:34:47 |