City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.145.217.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.145.217.140.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 19:36:04 CST 2025
;; MSG SIZE  rcvd: 108
        140.217.145.192.in-addr.arpa domain name pointer rfstecnologia.net.br.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
140.217.145.192.in-addr.arpa	name = rfstecnologia.net.br.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 46.229.168.133 | attack | Malicious Traffic/Form Submission  | 
                    2019-08-10 05:16:17 | 
| 92.53.65.189 | attackspam | 5648/tcp 5588/tcp 5611/tcp... [2019-07-17/08-09]229pkt,204pt.(tcp)  | 
                    2019-08-10 05:14:57 | 
| 134.73.129.191 | attackbots | Brute force SMTP login attempted. ...  | 
                    2019-08-10 04:49:49 | 
| 178.62.108.111 | attackspam | Automatic report - Banned IP Access  | 
                    2019-08-10 05:13:14 | 
| 46.3.96.67 | attack | 3260/tcp 3269/tcp 3263/tcp... [2019-06-08/08-09]3477pkt,961pt.(tcp)  | 
                    2019-08-10 04:57:50 | 
| 134.209.63.140 | attackbots | Aug 9 21:18:05 lnxded63 sshd[29558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.63.140  | 
                    2019-08-10 05:17:34 | 
| 60.184.124.161 | attackspambots | frenzy  | 
                    2019-08-10 05:17:53 | 
| 200.129.202.58 | attackspambots | Aug 9 17:06:02 server sshd[31662]: Failed password for invalid user l from 200.129.202.58 port 44823 ssh2 Aug 9 17:06:02 server sshd[31662]: Received disconnect from 200.129.202.58: 11: Bye Bye [preauth] Aug 9 17:11:57 server sshd[32002]: Failed password for invalid user stan from 200.129.202.58 port 6058 ssh2 Aug 9 17:11:58 server sshd[32002]: Received disconnect from 200.129.202.58: 11: Bye Bye [preauth] Aug 9 17:17:17 server sshd[32280]: Failed password for invalid user jana from 200.129.202.58 port 16014 ssh2 Aug 9 17:17:18 server sshd[32280]: Received disconnect from 200.129.202.58: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=200.129.202.58  | 
                    2019-08-10 05:08:53 | 
| 134.73.129.162 | attack | Brute force SMTP login attempted. ...  | 
                    2019-08-10 04:54:03 | 
| 134.209.82.3 | attack | Brute force SMTP login attempted. ...  | 
                    2019-08-10 05:09:50 | 
| 134.209.30.31 | attackspam | Brute force SMTP login attempted. ...  | 
                    2019-08-10 05:23:26 | 
| 134.209.40.230 | attack | Brute force SMTP login attempted. ...  | 
                    2019-08-10 05:23:01 | 
| 134.73.129.127 | attackbots | Brute force SMTP login attempted. ...  | 
                    2019-08-10 05:00:06 | 
| 5.135.198.62 | attackbotsspam | Aug 9 14:44:49 vps200512 sshd\[31107\]: Invalid user pb from 5.135.198.62 Aug 9 14:44:49 vps200512 sshd\[31107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.198.62 Aug 9 14:44:51 vps200512 sshd\[31107\]: Failed password for invalid user pb from 5.135.198.62 port 37132 ssh2 Aug 9 14:49:06 vps200512 sshd\[31146\]: Invalid user hk from 5.135.198.62 Aug 9 14:49:06 vps200512 sshd\[31146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.198.62  | 
                    2019-08-10 05:10:37 | 
| 182.253.220.109 | attack | Brute force SMTP login attempted. ...  | 
                    2019-08-10 05:02:09 |