City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 186.226.254.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39865
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;186.226.254.141.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:20:16 CST 2025
;; MSG SIZE  rcvd: 108
        141.254.226.186.in-addr.arpa domain name pointer 186-226-254-141.6ptelecom.com.br.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
141.254.226.186.in-addr.arpa	name = 186-226-254-141.6ptelecom.com.br.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 77.247.108.119 | attackspambots | firewall-block, port(s): 1388/tcp  | 
                    2019-12-01 08:14:02 | 
| 84.91.128.47 | attackbots | Invalid user speitel from 84.91.128.47 port 42512  | 
                    2019-12-01 08:05:22 | 
| 51.75.170.116 | attack | Nov 30 13:03:15 sip sshd[16779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.116 Nov 30 13:03:17 sip sshd[16779]: Failed password for invalid user thomey from 51.75.170.116 port 59090 ssh2 Nov 30 13:18:18 sip sshd[19501]: Failed password for root from 51.75.170.116 port 53444 ssh2  | 
                    2019-12-01 08:39:45 | 
| 59.13.139.42 | attackspambots | Nov 29 14:31:37 sip sshd[28730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.13.139.42 Nov 29 14:31:39 sip sshd[28730]: Failed password for invalid user incoming from 59.13.139.42 port 49644 ssh2 Nov 29 15:40:54 sip sshd[8927]: Failed password for ubuntu from 59.13.139.42 port 38418 ssh2  | 
                    2019-12-01 08:32:42 | 
| 129.28.191.55 | attack | Tried sshing with brute force.  | 
                    2019-12-01 08:14:17 | 
| 61.8.69.98 | attack | Nov 28 22:43:55 sip sshd[16232]: Failed password for root from 61.8.69.98 port 58558 ssh2 Nov 28 23:01:39 sip sshd[19403]: Failed password for root from 61.8.69.98 port 59972 ssh2 Nov 28 23:07:16 sip sshd[20412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.8.69.98  | 
                    2019-12-01 08:26:38 | 
| 103.121.26.150 | attackbotsspam | Nov 30 13:03:19 php1 sshd\[9259\]: Invalid user kojushio from 103.121.26.150 Nov 30 13:03:19 php1 sshd\[9259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.26.150 Nov 30 13:03:21 php1 sshd\[9259\]: Failed password for invalid user kojushio from 103.121.26.150 port 18032 ssh2 Nov 30 13:07:14 php1 sshd\[9527\]: Invalid user info from 103.121.26.150 Nov 30 13:07:14 php1 sshd\[9527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.26.150  | 
                    2019-12-01 08:04:36 | 
| 60.222.254.231 | attack | Nov 30 23:35:22 xeon postfix/smtpd[50803]: warning: unknown[60.222.254.231]: SASL LOGIN authentication failed: authentication failure  | 
                    2019-12-01 08:26:55 | 
| 118.161.137.208 | attack | Unauthorised access (Dec 1) SRC=118.161.137.208 LEN=40 TTL=44 ID=15224 TCP DPT=23 WINDOW=2255 SYN  | 
                    2019-12-01 08:24:14 | 
| 164.132.102.168 | attackbotsspam | fail2ban  | 
                    2019-12-01 08:23:14 | 
| 62.234.91.204 | attack | Nov 28 19:14:56 sip sshd[10930]: Failed password for root from 62.234.91.204 port 51096 ssh2 Nov 28 19:34:20 sip sshd[14496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.204 Nov 28 19:34:22 sip sshd[14496]: Failed password for invalid user stong from 62.234.91.204 port 53174 ssh2  | 
                    2019-12-01 08:25:49 | 
| 89.185.1.175 | attack | Nov 27 19:33:33 sip sshd[10770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.185.1.175 Nov 27 19:33:36 sip sshd[10770]: Failed password for invalid user server from 89.185.1.175 port 42172 ssh2 Nov 27 20:19:46 sip sshd[19253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.185.1.175  | 
                    2019-12-01 08:15:00 | 
| 138.94.160.57 | attackbots | Nov 30 14:05:45 sachi sshd\[3336\]: Invalid user minecraft from 138.94.160.57 Nov 30 14:05:45 sachi sshd\[3336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=57-160-94-138.turbonetburitis.com.br Nov 30 14:05:47 sachi sshd\[3336\]: Failed password for invalid user minecraft from 138.94.160.57 port 43402 ssh2 Nov 30 14:09:53 sachi sshd\[3668\]: Invalid user hoelzel from 138.94.160.57 Nov 30 14:09:53 sachi sshd\[3668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=57-160-94-138.turbonetburitis.com.br  | 
                    2019-12-01 08:11:45 | 
| 218.92.0.139 | attack | Dec 1 00:08:00 hcbbdb sshd\[1139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.139 user=root Dec 1 00:08:02 hcbbdb sshd\[1139\]: Failed password for root from 218.92.0.139 port 65449 ssh2 Dec 1 00:08:11 hcbbdb sshd\[1139\]: Failed password for root from 218.92.0.139 port 65449 ssh2 Dec 1 00:08:14 hcbbdb sshd\[1139\]: Failed password for root from 218.92.0.139 port 65449 ssh2 Dec 1 00:08:17 hcbbdb sshd\[1171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.139 user=root  | 
                    2019-12-01 08:11:28 | 
| 94.177.250.221 | attackspambots | Nov 29 02:26:49 sip sshd[24786]: Failed password for root from 94.177.250.221 port 41358 ssh2 Nov 29 02:34:59 sip sshd[26240]: Failed password for root from 94.177.250.221 port 51228 ssh2  | 
                    2019-12-01 08:10:19 |