City: Tangara Da Serra
Region: Mato Grosso
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.140.97.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;192.140.97.68. IN A
;; AUTHORITY SECTION:
. 577 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020060100 1800 900 604800 86400
;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 01 17:40:19 CST 2020
;; MSG SIZE rcvd: 117
68.97.140.192.in-addr.arpa has no PTR record
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 68.97.140.192.in-addr.arpa.: No answer
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
104.36.149.205 | attack | Dec 18 14:18:51 XXXXXX sshd[21806]: Invalid user cassandr from 104.36.149.205 port 52106 |
2019-12-19 05:00:23 |
103.113.64.6 | attackbots | Unauthorized connection attempt detected from IP address 103.113.64.6 to port 445 |
2019-12-19 05:27:10 |
185.8.181.43 | attackspambots | Unauthorized connection attempt from IP address 185.8.181.43 on Port 445(SMB) |
2019-12-19 05:26:36 |
119.136.125.194 | attackspam | Dec 18 15:31:15 grey postfix/smtpd\[23208\]: NOQUEUE: reject: RCPT from unknown\[119.136.125.194\]: 554 5.7.1 Service unavailable\; Client host \[119.136.125.194\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[119.136.125.194\]\; from=\ |
2019-12-19 05:09:23 |
1.52.191.24 | attack | Unauthorized connection attempt from IP address 1.52.191.24 on Port 445(SMB) |
2019-12-19 05:23:37 |
40.92.75.83 | attack | Dec 18 18:49:55 debian-2gb-vpn-nbg1-1 kernel: [1062559.827544] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.75.83 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=36697 DF PROTO=TCP SPT=10587 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-19 05:21:16 |
140.213.20.14 | attack | Email address rejected |
2019-12-19 05:18:07 |
212.71.251.228 | attackspambots | Dec 18 15:24:30 lvps92-51-164-246 sshd[21267]: Failed password for invalid user r.r from 212.71.251.228 port 39930 ssh2 Dec 18 15:24:30 lvps92-51-164-246 sshd[21267]: Received disconnect from 212.71.251.228: 11: Bye Bye [preauth] Dec 18 15:32:04 lvps92-51-164-246 sshd[21291]: Invalid user sensivhostnamey from 212.71.251.228 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=212.71.251.228 |
2019-12-19 05:07:20 |
132.232.32.228 | attack | Dec 18 17:40:48 Ubuntu-1404-trusty-64-minimal sshd\[10021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.228 user=root Dec 18 17:40:49 Ubuntu-1404-trusty-64-minimal sshd\[10021\]: Failed password for root from 132.232.32.228 port 45886 ssh2 Dec 18 17:58:46 Ubuntu-1404-trusty-64-minimal sshd\[22777\]: Invalid user scottt from 132.232.32.228 Dec 18 17:58:46 Ubuntu-1404-trusty-64-minimal sshd\[22777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.228 Dec 18 17:58:48 Ubuntu-1404-trusty-64-minimal sshd\[22777\]: Failed password for invalid user scottt from 132.232.32.228 port 39378 ssh2 |
2019-12-19 05:06:23 |
192.99.152.121 | attackbots | Invalid user jhony from 192.99.152.121 port 53100 |
2019-12-19 04:58:30 |
162.243.99.164 | attackspam | Dec 18 15:19:56 ws12vmsma01 sshd[48347]: Failed password for invalid user server from 162.243.99.164 port 51542 ssh2 Dec 18 15:25:45 ws12vmsma01 sshd[49154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.99.164 user=root Dec 18 15:25:47 ws12vmsma01 sshd[49154]: Failed password for root from 162.243.99.164 port 56827 ssh2 ... |
2019-12-19 05:19:56 |
40.92.10.36 | attackspam | Dec 18 21:35:45 debian-2gb-vpn-nbg1-1 kernel: [1072508.589782] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.10.36 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=105 ID=19317 DF PROTO=TCP SPT=23942 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0 |
2019-12-19 04:57:58 |
51.91.118.71 | attackspambots | Dec 17 08:56:35 liveconfig01 sshd[22330]: Invalid user yoyo from 51.91.118.71 Dec 17 08:56:35 liveconfig01 sshd[22330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.118.71 Dec 17 08:56:36 liveconfig01 sshd[22330]: Failed password for invalid user yoyo from 51.91.118.71 port 56420 ssh2 Dec 17 08:56:36 liveconfig01 sshd[22330]: Received disconnect from 51.91.118.71 port 56420:11: Bye Bye [preauth] Dec 17 08:56:36 liveconfig01 sshd[22330]: Disconnected from 51.91.118.71 port 56420 [preauth] Dec 17 09:07:42 liveconfig01 sshd[22781]: Invalid user jahnace from 51.91.118.71 Dec 17 09:07:42 liveconfig01 sshd[22781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.118.71 Dec 17 09:07:44 liveconfig01 sshd[22781]: Failed password for invalid user jahnace from 51.91.118.71 port 53534 ssh2 Dec 17 09:07:44 liveconfig01 sshd[22781]: Received disconnect from 51.91.118.71 port 53534:11: Bye By........ ------------------------------- |
2019-12-19 05:31:01 |
84.22.40.25 | attackspam | Unauthorized connection attempt from IP address 84.22.40.25 on Port 445(SMB) |
2019-12-19 05:29:08 |
222.99.52.216 | attack | 2019-12-18T21:42:12.567471centos sshd\[1953\]: Invalid user munchmadsen from 222.99.52.216 port 10499 2019-12-18T21:42:12.573842centos sshd\[1953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.99.52.216 2019-12-18T21:42:15.149254centos sshd\[1953\]: Failed password for invalid user munchmadsen from 222.99.52.216 port 10499 ssh2 |
2019-12-19 05:19:21 |