City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 179.89.111.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8376
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;179.89.111.94.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400
;; Query time: 412 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 02:03:52 CST 2025
;; MSG SIZE  rcvd: 106
        94.111.89.179.in-addr.arpa domain name pointer 179-89-111-94.user.vivozap.com.br.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
94.111.89.179.in-addr.arpa	name = 179-89-111-94.user.vivozap.com.br.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 194.26.29.25 | attackspambots | Jun 30 21:34:19 debian-2gb-nbg1-2 kernel: \[15804296.194687\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.25 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=8426 PROTO=TCP SPT=44076 DPT=3351 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-07-01 21:22:30 | 
| 38.95.167.16 | attackspambots | portscan  | 
                    2020-07-01 21:15:14 | 
| 36.112.108.195 | attackspam | Invalid user lwq from 36.112.108.195 port 16835  | 
                    2020-07-01 21:00:06 | 
| 46.38.145.252 | attack | 2020-06-30T13:28:05.076723linuxbox-skyline auth[405349]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=srvc57 rhost=46.38.145.252 ...  | 
                    2020-07-01 20:58:47 | 
| 35.185.133.141 | attack | /wp-login.php  | 
                    2020-07-01 20:41:40 | 
| 190.216.166.170 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-07-01 21:26:13 | 
| 51.91.123.119 | attackspambots | Jun 30 22:36:41 ift sshd\[39407\]: Invalid user wx from 51.91.123.119Jun 30 22:36:43 ift sshd\[39407\]: Failed password for invalid user wx from 51.91.123.119 port 49902 ssh2Jun 30 22:40:29 ift sshd\[39984\]: Invalid user steven from 51.91.123.119Jun 30 22:40:31 ift sshd\[39984\]: Failed password for invalid user steven from 51.91.123.119 port 48510 ssh2Jun 30 22:44:28 ift sshd\[40293\]: Failed password for root from 51.91.123.119 port 47090 ssh2 ...  | 
                    2020-07-01 21:26:45 | 
| 177.67.14.232 | attack | SS5,DEF GET /admin/login.asp  | 
                    2020-07-01 20:34:13 | 
| 212.70.149.34 | attackbotsspam | Honeypot hit: misc  | 
                    2020-07-01 21:19:21 | 
| 177.231.138.75 | attackbots | 
  | 
                    2020-07-01 21:02:55 | 
| 167.172.156.227 | attackspam | firewall-block, port(s): 13728/tcp  | 
                    2020-07-01 21:18:38 | 
| 52.172.216.220 | attackspam | 2020-06-30T09:42:34.480276vps773228.ovh.net sshd[7111]: Failed password for root from 52.172.216.220 port 63848 ssh2 2020-06-30T16:24:51.696146vps773228.ovh.net sshd[10094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.216.220 user=root 2020-06-30T16:24:53.688371vps773228.ovh.net sshd[10094]: Failed password for root from 52.172.216.220 port 24667 ssh2 2020-06-30T21:02:55.520177vps773228.ovh.net sshd[13578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.216.220 user=root 2020-06-30T21:02:57.931751vps773228.ovh.net sshd[13578]: Failed password for root from 52.172.216.220 port 21378 ssh2 ...  | 
                    2020-07-01 20:47:06 | 
| 211.208.225.110 | attack | Jun 30 19:40:46 rotator sshd\[28711\]: Invalid user tomcat from 211.208.225.110Jun 30 19:40:48 rotator sshd\[28711\]: Failed password for invalid user tomcat from 211.208.225.110 port 56116 ssh2Jun 30 19:44:00 rotator sshd\[28730\]: Failed password for root from 211.208.225.110 port 51690 ssh2Jun 30 19:47:19 rotator sshd\[29508\]: Failed password for root from 211.208.225.110 port 47260 ssh2Jun 30 19:50:35 rotator sshd\[30277\]: Invalid user debug from 211.208.225.110Jun 30 19:50:36 rotator sshd\[30277\]: Failed password for invalid user debug from 211.208.225.110 port 42844 ssh2 ...  | 
                    2020-07-01 21:16:36 | 
| 103.14.234.22 | attackspam | Open proxy used for DoS attacks  | 
                    2020-07-01 20:39:17 | 
| 61.133.122.19 | attackspam | Jul 1 05:32:11 localhost sshd[2321507]: Invalid user tmp from 61.133.122.19 port 57828 ...  | 
                    2020-07-01 21:08:50 |