City: São Gonçalo
Region: Rio de Janeiro
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 187.78.145.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45250
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;187.78.145.139. IN A
;; AUTHORITY SECTION:
. 383 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023012201 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 23 08:35:59 CST 2023
;; MSG SIZE rcvd: 107
139.145.78.187.in-addr.arpa domain name pointer 187-78-145-139.user.veloxzone.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.145.78.187.in-addr.arpa name = 187-78-145-139.user.veloxzone.com.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 160.153.154.26 | attackspam | xmlrpc attack |
2020-09-02 05:14:17 |
| 52.152.175.43 | attackbots | /App_Master/Telerik.Web.UI.DialogHandler.aspx |
2020-09-02 04:53:58 |
| 193.112.49.125 | attackspambots | Sep 1 03:36:34 web1 sshd\[31386\]: Invalid user odoo from 193.112.49.125 Sep 1 03:36:34 web1 sshd\[31386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.49.125 Sep 1 03:36:36 web1 sshd\[31386\]: Failed password for invalid user odoo from 193.112.49.125 port 41626 ssh2 Sep 1 03:42:31 web1 sshd\[31881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.49.125 user=root Sep 1 03:42:32 web1 sshd\[31881\]: Failed password for root from 193.112.49.125 port 54028 ssh2 |
2020-09-02 04:56:17 |
| 122.35.120.59 | attackbotsspam | Sep 1 18:20:33 ajax sshd[30732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.35.120.59 Sep 1 18:20:35 ajax sshd[30732]: Failed password for invalid user sunil from 122.35.120.59 port 34072 ssh2 |
2020-09-02 05:10:20 |
| 45.230.176.146 | attack | Sep 1 13:26:28 shivevps sshd[27336]: Bad protocol version identification '\024' from 45.230.176.146 port 55399 ... |
2020-09-02 04:45:01 |
| 180.126.50.141 | attackbots | Icarus honeypot on github |
2020-09-02 05:13:16 |
| 189.85.146.85 | attackbotsspam | Sep 1 08:06:22 web1 sshd\[19697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.85.146.85 user=root Sep 1 08:06:24 web1 sshd\[19697\]: Failed password for root from 189.85.146.85 port 56627 ssh2 Sep 1 08:08:22 web1 sshd\[19854\]: Invalid user testuser from 189.85.146.85 Sep 1 08:08:22 web1 sshd\[19854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.85.146.85 Sep 1 08:08:23 web1 sshd\[19854\]: Failed password for invalid user testuser from 189.85.146.85 port 40650 ssh2 |
2020-09-02 05:18:02 |
| 188.119.149.71 | attack | TCP Port: 25 invalid blocked Listed on barracuda also spam-sorbs and MailSpike L3-L5 (120) |
2020-09-02 05:07:32 |
| 84.17.60.216 | attackspam | (From wehrle.robby@gmail.com) Hello, I have been informed to contact you. The CIA has been doing intensive research for the past fifty years researching on what we call so called life. That information has been collected and presented for you here https://bit.ly/3lqUJ3u This has been the finding as of seventeen years ago as of today. Now governments and other large organizations have develop technology around these concepts for their own deceptive uses. Soon you will be contacted by other means for counter measures and the part that you play in all this. Please get this as soon as possible because there are powers that be to take down this information about this. |
2020-09-02 04:54:53 |
| 213.6.65.30 | attackbots | Sep 1 13:26:28 shivevps sshd[27337]: Bad protocol version identification '\024' from 213.6.65.30 port 54682 ... |
2020-09-02 04:44:31 |
| 186.96.110.5 | attackspambots | Sep 1 13:26:12 shivevps sshd[27155]: Bad protocol version identification '\024' from 186.96.110.5 port 37748 ... |
2020-09-02 04:56:29 |
| 178.128.217.58 | attackbots | Invalid user deploy from 178.128.217.58 port 34030 |
2020-09-02 05:20:11 |
| 178.151.27.223 | attack | Port probing on unauthorized port 445 |
2020-09-02 05:11:38 |
| 54.38.218.213 | attack | Sep 1 13:26:21 shivevps sshd[26622]: Did not receive identification string from 54.38.218.213 port 36729 ... |
2020-09-02 04:49:45 |
| 117.69.231.219 | attackbotsspam | Sep 1 13:26:14 shivevps sshd[27181]: Bad protocol version identification '\024' from 117.69.231.219 port 59724 ... |
2020-09-02 04:54:18 |