City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: Vivo
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 191.27.29.71 | attackspambots | Unauthorized connection attempt detected from IP address 191.27.29.71 to port 22 |
2020-07-22 22:12:08 |
b'% IP Client: 8.214.16.196
% Copyright (c) Nic.br - Use of this data is governed by the Use and
% Privacy Policy at https://registro.br/upp . Distribution,
% commercialization, reproduction, and use for advertising or similar
% purposes are expressly prohibited.
% 2025-11-22T09:45:20-03:00 - 8.214.16.196
inetnum: 191.24.0.0/14
aut-num: AS26599
abuse-c: CSTBR
owner: TELEFxc3xafxc2xbfxc2xbdNICA BRASIL S.A
ownerid: 02.558.157/0001-62
responsible: Diretoria de Planejamento e Tecnologia
country: BR
owner-c: ARITE
tech-c: ARITE
inetrev: 191.24.0.0/14
nserver: hercules.vivo.com.br
nsstat: 20251120 AA
nslastaa: 20251120
nserver: orion.vivo.com.br
nsstat: 20251120 AA
nslastaa: 20251120
nserver: lynx.vivo.com.br
nsstat: 20251120 AA
nslastaa: 20251120
nserver: aquarius.vivo.com.br
nsstat: 20251120 AA
nslastaa: 20251120
created: 20140130
changed: 20140130
nic-hdl-br: ARITE
person: Administraxc3xafxc2xbfxc2xbdxc3xafxc2xbfxc2xbdo Rede IP Telesp
e-mail: dominios-vivo.br@telefonica.com
country: BR
created: 20080407
changed: 20230629
nic-hdl-br: CSTBR
person: CSIRT TELEFONICA BR
e-mail: abuse.br@telefonica.com
country: BR
created: 20180713
changed: 20180713
% Security and mail abuse issues should also be addressed to cert.br,
% respectivelly to cert@cert.br and mail-abuse@cert.br
%
% whois.registro.br only accepts exact match queries for domains,
% registrants, contacts, tickets, providers, IPs, and ASNs.'
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.27.29.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;191.27.29.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025112200 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 22 20:40:51 CST 2025
;; MSG SIZE rcvd: 105
55.29.27.191.in-addr.arpa domain name pointer 191-27-29-55.user.vivozap.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
55.29.27.191.in-addr.arpa name = 191-27-29-55.user.vivozap.com.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.119.190.152 | attackbotsspam | Autoban 190.119.190.152 AUTH/CONNECT |
2019-08-18 08:22:26 |
| 113.22.115.171 | attackbotsspam | Aug 17 23:36:10 thevastnessof sshd[20093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.22.115.171 ... |
2019-08-18 08:14:29 |
| 114.32.218.77 | attackspambots | Automated report - ssh fail2ban: Aug 18 02:18:32 authentication failure Aug 18 02:18:33 wrong password, user=webadmin, port=47854, ssh2 Aug 18 02:23:47 authentication failure |
2019-08-18 08:41:16 |
| 128.199.133.249 | attackbotsspam | Aug 18 02:35:35 vmd17057 sshd\[24602\]: Invalid user zimbra from 128.199.133.249 port 59798 Aug 18 02:35:35 vmd17057 sshd\[24602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.249 Aug 18 02:35:37 vmd17057 sshd\[24602\]: Failed password for invalid user zimbra from 128.199.133.249 port 59798 ssh2 ... |
2019-08-18 08:46:32 |
| 178.62.28.79 | attackbotsspam | Aug 17 23:21:51 sshgateway sshd\[25761\]: Invalid user abbott from 178.62.28.79 Aug 17 23:21:51 sshgateway sshd\[25761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.28.79 Aug 17 23:21:52 sshgateway sshd\[25761\]: Failed password for invalid user abbott from 178.62.28.79 port 45576 ssh2 |
2019-08-18 08:19:34 |
| 177.185.144.27 | attackbots | Aug 18 03:08:37 www5 sshd\[49106\]: Invalid user celine from 177.185.144.27 Aug 18 03:08:37 www5 sshd\[49106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.144.27 Aug 18 03:08:40 www5 sshd\[49106\]: Failed password for invalid user celine from 177.185.144.27 port 30852 ssh2 ... |
2019-08-18 08:23:12 |
| 88.153.128.51 | attackbots | 2019-08-18T00:46:15.386474abusebot.cloudsearch.cf sshd\[22763\]: Invalid user q3server from 88.153.128.51 port 51767 |
2019-08-18 08:54:56 |
| 134.209.63.140 | attackspambots | Invalid user zheng from 134.209.63.140 port 48840 |
2019-08-18 08:47:07 |
| 179.187.11.217 | attack | Automatic report - Port Scan Attack |
2019-08-18 08:35:18 |
| 128.199.252.144 | attackspambots | Invalid user test1 from 128.199.252.144 port 58483 |
2019-08-18 08:54:24 |
| 162.247.74.204 | attack | $f2bV_matches |
2019-08-18 08:46:52 |
| 191.209.102.59 | attack | scan z |
2019-08-18 08:51:33 |
| 66.252.214.165 | attack | "Fail2Ban detected SSH brute force attempt" |
2019-08-18 08:48:29 |
| 50.250.231.41 | attack | Aug 18 00:26:09 ns341937 sshd[26143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.250.231.41 Aug 18 00:26:11 ns341937 sshd[26143]: Failed password for invalid user iony from 50.250.231.41 port 40258 ssh2 Aug 18 00:37:06 ns341937 sshd[28042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.250.231.41 ... |
2019-08-18 08:42:55 |
| 157.230.13.28 | attackspam | Automatic report |
2019-08-18 08:49:15 |