City: São Paulo
Region: Sao Paulo
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% IP Client: 124.223.158.242
% Copyright (c) Nic.br - Use of this data is governed by the Use and
% Privacy Policy at https://registro.br/upp . Distribution,
% commercialization, reproduction, and use for advertising or similar
% purposes are expressly prohibited.
% 2025-09-27T21:41:57-03:00 - 124.223.158.242
inetnum: 179.164.0.0/14
aut-num: AS26599
abuse-c: CSTBR
owner: TELEF�NICA BRASIL S.A
ownerid: 02.558.157/0001-62
responsible: Diretoria de Planejamento e Tecnologia
owner-c: ARITE
tech-c: ARITE
inetrev: 179.164.0.0/14
nserver: hercules.vivo.com.br
nsstat: 20250925 AA
nslastaa: 20250925
nserver: lynx.vivo.com.br
nsstat: 20250925 AA
nslastaa: 20250925
nserver: orion.vivo.com.br
nsstat: 20250925 AA
nslastaa: 20250925
nserver: aquarius.vivo.com.br
nsstat: 20250925 AA
nslastaa: 20250925
created: 20130124
changed: 20131114
nic-hdl-br: ARITE
person: Administra��o Rede IP Telesp
created: 20080407
changed: 20230629
nic-hdl-br: CSTBR
person: CSIRT TELEFONICA BR
created: 20180713
changed: 20180713
% Security and mail abuse issues should also be addressed to cert.br,
% respectivelly to cert@cert.br and mail-abuse@cert.br
%
% whois.registro.br only accepts exact match queries for domains,
% registrants, contacts, tickets, providers, IPs, and ASNs.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 179.165.222.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26264
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;179.165.222.5. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092701 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 28 08:41:57 CST 2025
;; MSG SIZE rcvd: 106
5.222.165.179.in-addr.arpa domain name pointer 179-165-222-5.user.vivozap.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
5.222.165.179.in-addr.arpa name = 179-165-222-5.user.vivozap.com.br.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
177.152.113.56 | attack | 2019-11-20 14:02:40 unexpected disconnection while reading SMTP command from 177-152-113-56.host.webda.com.br [177.152.113.56]:14534 I=[10.100.18.22]:25 (error: Connection reset by peer) 2019-11-20 15:40:07 H=177-152-113-56.host.webda.com.br [177.152.113.56]:15195 I=[10.100.18.22]:25 F= |
2019-11-21 02:06:20 |
51.77.32.33 | attackbotsspam | 2019-11-20T15:42:55.947588centos sshd\[21220\]: Invalid user tjjhtea from 51.77.32.33 port 43098 2019-11-20T15:42:55.953217centos sshd\[21220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=u-232.dev 2019-11-20T15:42:57.502868centos sshd\[21220\]: Failed password for invalid user tjjhtea from 51.77.32.33 port 43098 ssh2 |
2019-11-21 02:04:53 |
217.170.205.107 | attackbots | Automatic report - XMLRPC Attack |
2019-11-21 02:10:26 |
185.176.27.246 | attack | 11/20/2019-11:48:25.179249 185.176.27.246 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-21 01:57:28 |
66.84.91.17 | attackbotsspam | (From ryanc@pjnmail.com) I came across your website (https://www.kestenchiro.com/page/contact.html) and just wanted to reach out to see if you're hiring? If so, I'd like to extend an offer to post to top job sites like ZipRecruiter, Glassdoor, TopUSAJobs, and more at no cost for two weeks. Here are some of the key benefits: -- Post to top job sites with one click -- Manage all candidates in one place -- No cost for two weeks You can post your job openings now by going to our website below: >> http://www.TryProJob.com * Please use offer code 987FREE -- Expires Soon * Thanks for your time, Ryan C. Pro Job Network 10451 Twin Rivers Rd #279 Columbia, MD 21044 To OPT OUT, please email ryanc@pjnmail.com with "REMOVE kestenchiro.com" in the subject line. |
2019-11-21 02:29:10 |
115.74.52.106 | attackbots | 2019-11-20 14:34:50 H=(adsl.viettel.vn) [115.74.52.106]:16846 I=[10.100.18.20]:25 F= |
2019-11-21 02:13:18 |
104.238.110.15 | attack | WordPress login Brute force / Web App Attack on client site. |
2019-11-21 02:14:53 |
103.248.25.171 | attack | SSH Brute-Force reported by Fail2Ban |
2019-11-21 02:21:16 |
211.195.12.33 | attackbots | 2019-11-20T17:47:51.427526abusebot-4.cloudsearch.cf sshd\[28639\]: Invalid user binladen from 211.195.12.33 port 32996 |
2019-11-21 02:18:32 |
195.225.49.20 | attackspambots | Unauthorised access (Nov 20) SRC=195.225.49.20 LEN=52 TTL=117 ID=9142 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-21 02:13:53 |
61.28.227.133 | attackbotsspam | Repeated brute force against a port |
2019-11-21 02:27:27 |
49.88.112.116 | attack | Nov 20 18:43:36 localhost sshd\[1992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116 user=root Nov 20 18:43:38 localhost sshd\[1992\]: Failed password for root from 49.88.112.116 port 48925 ssh2 Nov 20 18:43:40 localhost sshd\[1992\]: Failed password for root from 49.88.112.116 port 48925 ssh2 |
2019-11-21 01:53:43 |
201.6.99.139 | attackspam | 2019-11-20T16:22:14.419342abusebot-5.cloudsearch.cf sshd\[10655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.99.139 user=root |
2019-11-21 01:53:17 |
159.69.107.139 | attackspam | blocked for 1h |
2019-11-21 02:02:05 |
106.13.11.127 | attackspam | Automatic report - Banned IP Access |
2019-11-21 02:14:10 |