City: Curitiba
Region: Parana
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: COPEL Telecomunicações S.A.
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.150.85.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62058
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.150.85.48. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019070801 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 09 03:20:27 CST 2019
;; MSG SIZE rcvd: 117
48.85.150.200.in-addr.arpa domain name pointer 48.85.150.200.static.copel.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 48.85.150.200.in-addr.arpa.: No answer
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
124.84.242.10 | attackspambots | Trojan.Nancrat Activity 4 - high-risk intrusion |
2019-11-13 17:01:54 |
82.23.32.68 | attackbotsspam | TCP Port Scanning |
2019-11-13 16:35:53 |
79.120.46.238 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-13 16:56:20 |
111.231.89.162 | attackbots | 2019-11-13T03:27:58.5134791495-001 sshd\[34936\]: Invalid user govier from 111.231.89.162 port 49270 2019-11-13T03:27:58.5237501495-001 sshd\[34936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.89.162 2019-11-13T03:28:00.3852801495-001 sshd\[34936\]: Failed password for invalid user govier from 111.231.89.162 port 49270 ssh2 2019-11-13T03:32:28.8566731495-001 sshd\[35113\]: Invalid user node from 111.231.89.162 port 57094 2019-11-13T03:32:28.8651911495-001 sshd\[35113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.89.162 2019-11-13T03:32:30.4605381495-001 sshd\[35113\]: Failed password for invalid user node from 111.231.89.162 port 57094 ssh2 ... |
2019-11-13 16:51:34 |
187.138.215.194 | attackspambots | 1573626449 - 11/13/2019 07:27:29 Host: dsl-187-138-215-194-dyn.prod-infinitum.com.mx/187.138.215.194 Port: 1900 UDP Blocked |
2019-11-13 16:38:37 |
181.48.68.54 | attackspambots | Nov 13 08:55:18 rotator sshd\[12499\]: Invalid user nagios from 181.48.68.54Nov 13 08:55:21 rotator sshd\[12499\]: Failed password for invalid user nagios from 181.48.68.54 port 53646 ssh2Nov 13 09:00:01 rotator sshd\[12564\]: Invalid user dorla from 181.48.68.54Nov 13 09:00:03 rotator sshd\[12564\]: Failed password for invalid user dorla from 181.48.68.54 port 53926 ssh2Nov 13 09:04:37 rotator sshd\[13353\]: Invalid user asher from 181.48.68.54Nov 13 09:04:40 rotator sshd\[13353\]: Failed password for invalid user asher from 181.48.68.54 port 54190 ssh2 ... |
2019-11-13 16:19:50 |
92.118.160.13 | attack | UTC: 2019-11-12 port: 22/tcp |
2019-11-13 16:44:50 |
206.189.229.112 | attack | Nov 13 01:27:20 Tower sshd[14797]: Connection from 206.189.229.112 port 38630 on 192.168.10.220 port 22 Nov 13 01:27:20 Tower sshd[14797]: Invalid user sriranjani from 206.189.229.112 port 38630 Nov 13 01:27:20 Tower sshd[14797]: error: Could not get shadow information for NOUSER Nov 13 01:27:20 Tower sshd[14797]: Failed password for invalid user sriranjani from 206.189.229.112 port 38630 ssh2 Nov 13 01:27:20 Tower sshd[14797]: Received disconnect from 206.189.229.112 port 38630:11: Bye Bye [preauth] Nov 13 01:27:20 Tower sshd[14797]: Disconnected from invalid user sriranjani 206.189.229.112 port 38630 [preauth] |
2019-11-13 16:43:42 |
222.186.169.192 | attackspambots | SSH Brute Force, server-1 sshd[22284]: Failed password for root from 222.186.169.192 port 29740 ssh2 |
2019-11-13 16:23:26 |
60.54.114.211 | attackbots | Unauthorised access (Nov 13) SRC=60.54.114.211 LEN=44 TTL=53 ID=11548 TCP DPT=23 WINDOW=13748 SYN |
2019-11-13 16:42:50 |
110.188.70.99 | attackspambots | SSH Brute Force, server-1 sshd[21630]: Failed password for invalid user buffalo from 110.188.70.99 port 31199 ssh2 |
2019-11-13 16:41:17 |
51.77.148.87 | attackbotsspam | Nov 13 07:46:09 srv01 sshd[1313]: Invalid user oracle from 51.77.148.87 Nov 13 07:46:09 srv01 sshd[1313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-51-77-148.eu Nov 13 07:46:09 srv01 sshd[1313]: Invalid user oracle from 51.77.148.87 Nov 13 07:46:11 srv01 sshd[1313]: Failed password for invalid user oracle from 51.77.148.87 port 49878 ssh2 Nov 13 07:49:40 srv01 sshd[1544]: Invalid user ident from 51.77.148.87 ... |
2019-11-13 16:52:18 |
106.12.176.53 | attackspam | Nov 12 22:23:22 hanapaa sshd\[31062\]: Invalid user server from 106.12.176.53 Nov 12 22:23:22 hanapaa sshd\[31062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.53 Nov 12 22:23:24 hanapaa sshd\[31062\]: Failed password for invalid user server from 106.12.176.53 port 48376 ssh2 Nov 12 22:28:14 hanapaa sshd\[31403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.53 user=root Nov 12 22:28:16 hanapaa sshd\[31403\]: Failed password for root from 106.12.176.53 port 60166 ssh2 |
2019-11-13 16:50:13 |
123.16.22.51 | attackspam | Lines containing failures of 123.16.22.51 Oct 17 17:37:25 server-name sshd[5970]: Invalid user accept from 123.16.22.51 port 50840 Oct 17 17:37:25 server-name sshd[5970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.22.51 Oct 17 17:37:28 server-name sshd[5970]: Failed password for invalid user accept from 123.16.22.51 port 50840 ssh2 Oct 17 17:37:30 server-name sshd[5970]: Connection closed by invalid user accept 123.16.22.51 port 50840 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=123.16.22.51 |
2019-11-13 16:33:35 |
178.223.121.132 | attackbots | web exploits ... |
2019-11-13 16:58:52 |