City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.92.142.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11945
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.92.142.78. IN A
;; AUTHORITY SECTION:
. 177 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040402 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 05 10:39:51 CST 2022
;; MSG SIZE rcvd: 106
78.142.92.192.in-addr.arpa domain name pointer endpub078.scom3.uminho.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
78.142.92.192.in-addr.arpa name = endpub078.scom3.uminho.pt.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
203.185.61.137 | attack | Feb 10 16:08:07 woltan sshd[1253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.185.61.137 |
2020-02-11 00:38:17 |
190.80.34.27 | attackbotsspam | Telnet Server BruteForce Attack |
2020-02-11 00:38:48 |
49.88.112.65 | attack | Feb 10 06:56:00 hanapaa sshd\[2934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65 user=root Feb 10 06:56:02 hanapaa sshd\[2934\]: Failed password for root from 49.88.112.65 port 43773 ssh2 Feb 10 06:57:13 hanapaa sshd\[3023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65 user=root Feb 10 06:57:15 hanapaa sshd\[3023\]: Failed password for root from 49.88.112.65 port 30522 ssh2 Feb 10 06:58:20 hanapaa sshd\[3111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65 user=root |
2020-02-11 01:06:56 |
151.237.185.4 | attackspam | Honeypot attack, port: 445, PTR: pohod.vertclick.com. |
2020-02-11 00:40:34 |
1.162.144.14 | attackspam | Unauthorized connection attempt detected, IP banned. |
2020-02-11 01:05:53 |
139.199.29.155 | attackspam | Automatic report - Banned IP Access |
2020-02-11 01:01:22 |
203.148.53.227 | attackspam | $f2bV_matches |
2020-02-11 01:13:41 |
203.160.91.226 | attack | $f2bV_matches |
2020-02-11 01:01:05 |
117.6.97.138 | attackspam | Feb 10 14:39:58 v22018076622670303 sshd\[16033\]: Invalid user rsw from 117.6.97.138 port 13271 Feb 10 14:39:58 v22018076622670303 sshd\[16033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.6.97.138 Feb 10 14:40:00 v22018076622670303 sshd\[16033\]: Failed password for invalid user rsw from 117.6.97.138 port 13271 ssh2 ... |
2020-02-11 00:57:02 |
71.246.53.5 | attack | Honeypot attack, port: 81, PTR: static-71-246-53-5.lsanca.fios.frontiernet.net. |
2020-02-11 01:22:08 |
190.177.80.150 | attackbotsspam | Brute force attempt |
2020-02-11 00:51:20 |
91.234.194.246 | attack | 91.234.194.246 - - [10/Feb/2020:13:39:49 +0000] "GET /wp-login.php HTTP/1.1" 403 153 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-02-11 01:11:48 |
92.207.180.50 | attackspambots | Feb 10 18:03:30 silence02 sshd[2396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50 Feb 10 18:03:32 silence02 sshd[2396]: Failed password for invalid user ogf from 92.207.180.50 port 56241 ssh2 Feb 10 18:07:17 silence02 sshd[2627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50 |
2020-02-11 01:10:02 |
41.191.225.22 | attackspam | Brute force attempt |
2020-02-11 00:59:20 |
125.69.67.130 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-11 01:14:10 |