City: Pirassununga
Region: Sao Paulo
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 187.121.215.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52010
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;187.121.215.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:25:30 CST 2025
;; MSG SIZE rcvd: 107
42.215.121.187.in-addr.arpa domain name pointer 187-121-215-42.ntelecom.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.215.121.187.in-addr.arpa name = 187-121-215-42.ntelecom.com.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.85.42.181 | attackspam | Jun 4 17:11:37 santamaria sshd\[10376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181 user=root Jun 4 17:11:39 santamaria sshd\[10376\]: Failed password for root from 112.85.42.181 port 40165 ssh2 Jun 4 17:11:53 santamaria sshd\[10376\]: Failed password for root from 112.85.42.181 port 40165 ssh2 ... |
2020-06-04 23:17:52 |
| 142.93.154.174 | attackspam | Jun 4 06:37:09 server1 sshd\[22967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 user=root Jun 4 06:37:11 server1 sshd\[22967\]: Failed password for root from 142.93.154.174 port 41644 ssh2 Jun 4 06:40:56 server1 sshd\[19025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 user=root Jun 4 06:40:58 server1 sshd\[19025\]: Failed password for root from 142.93.154.174 port 40226 ssh2 Jun 4 06:44:38 server1 sshd\[17115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 user=root ... |
2020-06-04 23:25:03 |
| 91.219.253.27 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-06-04 23:07:16 |
| 144.217.95.97 | attackbotsspam | Jun 4 14:21:33 ncomp sshd[12245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.95.97 user=root Jun 4 14:21:35 ncomp sshd[12245]: Failed password for root from 144.217.95.97 port 50000 ssh2 Jun 4 14:48:51 ncomp sshd[13210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.95.97 user=root Jun 4 14:48:54 ncomp sshd[13210]: Failed password for root from 144.217.95.97 port 38234 ssh2 |
2020-06-04 23:14:50 |
| 122.7.82.158 | attack | " " |
2020-06-04 23:32:04 |
| 61.141.221.236 | attackspambots | Jun 3 11:06:52 host sshd[18969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.141.221.236 user=r.r Jun 3 11:06:54 host sshd[18969]: Failed password for r.r from 61.141.221.236 port 39012 ssh2 Jun 3 11:06:54 host sshd[18969]: Received disconnect from 61.141.221.236: 11: Bye Bye [preauth] Jun 3 11:09:44 host sshd[27955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.141.221.236 user=r.r Jun 3 11:09:46 host sshd[27955]: Failed password for r.r from 61.141.221.236 port 40632 ssh2 Jun 3 11:09:47 host sshd[27955]: Received disconnect from 61.141.221.236: 11: Bye Bye [preauth] Jun 3 11:11:27 host sshd[1318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.141.221.236 user=r.r Jun 3 11:11:29 host sshd[1318]: Failed password for r.r from 61.141.221.236 port 33036 ssh2 Jun 3 11:11:30 host sshd[1318]: Received disconnect from 61.141.221......... ------------------------------- |
2020-06-04 23:00:18 |
| 180.76.158.139 | attackbots | (sshd) Failed SSH login from 180.76.158.139 (CN/China/-): 5 in the last 3600 secs |
2020-06-04 23:33:00 |
| 51.81.53.159 | attackspambots | SSH brutforce |
2020-06-04 23:26:58 |
| 45.138.100.217 | attackspam | Chat Spam |
2020-06-04 23:23:27 |
| 195.54.160.213 | attackbots | Jun 4 18:23:53 debian kernel: [186796.261264] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=195.54.160.213 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=21645 PROTO=TCP SPT=56237 DPT=3030 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-04 23:34:48 |
| 115.236.19.35 | attack | Jun 4 15:06:34 root sshd[1790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.19.35 user=root Jun 4 15:06:37 root sshd[1790]: Failed password for root from 115.236.19.35 port 2610 ssh2 ... |
2020-06-04 23:21:05 |
| 45.143.220.111 | attackbots | DDOS |
2020-06-04 23:29:56 |
| 62.122.156.79 | attackspam | Jun 4 20:06:50 itv-usvr-01 sshd[3222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.156.79 user=root Jun 4 20:06:53 itv-usvr-01 sshd[3222]: Failed password for root from 62.122.156.79 port 56914 ssh2 Jun 4 20:10:21 itv-usvr-01 sshd[3497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.156.79 user=root Jun 4 20:10:23 itv-usvr-01 sshd[3497]: Failed password for root from 62.122.156.79 port 50832 ssh2 Jun 4 20:13:43 itv-usvr-01 sshd[3624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.156.79 user=root Jun 4 20:13:45 itv-usvr-01 sshd[3624]: Failed password for root from 62.122.156.79 port 44748 ssh2 |
2020-06-04 23:11:42 |
| 77.247.181.162 | attack | Jun 4 15:57:59 web2 sshd[6961]: Failed password for sshd from 77.247.181.162 port 46292 ssh2 Jun 4 15:58:01 web2 sshd[6961]: Failed password for sshd from 77.247.181.162 port 46292 ssh2 |
2020-06-04 22:58:30 |
| 88.249.30.83 | attack | Port probing on unauthorized port 445 |
2020-06-04 22:52:22 |