City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.157.103.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;200.157.103.116.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:20:05 CST 2025
;; MSG SIZE  rcvd: 108
        116.103.157.200.in-addr.arpa domain name pointer 200-157-103-116.ded.intelignet.com.br.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
116.103.157.200.in-addr.arpa	name = 200-157-103-116.ded.intelignet.com.br.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 218.10.128.77 | attack | Port Scan: TCP/21  | 
                    2019-10-10 16:52:07 | 
| 51.158.113.194 | attack | 2019-10-10T04:55:00.682725shield sshd\[18371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.113.194 user=root 2019-10-10T04:55:02.699470shield sshd\[18371\]: Failed password for root from 51.158.113.194 port 39046 ssh2 2019-10-10T04:58:47.302545shield sshd\[18846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.113.194 user=root 2019-10-10T04:58:49.815981shield sshd\[18846\]: Failed password for root from 51.158.113.194 port 50530 ssh2 2019-10-10T05:02:37.769029shield sshd\[19115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.113.194 user=root  | 
                    2019-10-10 16:41:12 | 
| 5.57.33.71 | attack | Oct 10 07:06:36 www sshd\[14772\]: Invalid user @WSX\#EDC$RFV from 5.57.33.71Oct 10 07:06:38 www sshd\[14772\]: Failed password for invalid user @WSX\#EDC$RFV from 5.57.33.71 port 46498 ssh2Oct 10 07:10:14 www sshd\[14854\]: Invalid user Welcome from 5.57.33.71 ...  | 
                    2019-10-10 16:40:48 | 
| 112.64.34.165 | attackspambots | Oct 10 10:01:52 MK-Soft-VM5 sshd[25087]: Failed password for root from 112.64.34.165 port 36067 ssh2 ...  | 
                    2019-10-10 16:42:05 | 
| 14.39.162.46 | attackbots | 10/09/2019-23:48:45.484689 14.39.162.46 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433  | 
                    2019-10-10 16:35:20 | 
| 202.73.9.76 | attackbotsspam | Repeated brute force against a port  | 
                    2019-10-10 16:27:46 | 
| 106.12.111.201 | attackbots | Oct 10 01:49:15 plusreed sshd[2014]: Invalid user o0i9u8y7t6 from 106.12.111.201 ...  | 
                    2019-10-10 16:48:57 | 
| 158.69.113.39 | attack | Oct 9 23:41:07 xtremcommunity sshd\[361088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.113.39 user=root Oct 9 23:41:08 xtremcommunity sshd\[361088\]: Failed password for root from 158.69.113.39 port 58996 ssh2 Oct 9 23:44:41 xtremcommunity sshd\[361166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.113.39 user=root Oct 9 23:44:43 xtremcommunity sshd\[361166\]: Failed password for root from 158.69.113.39 port 42384 ssh2 Oct 9 23:48:21 xtremcommunity sshd\[361240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.113.39 user=root ...  | 
                    2019-10-10 16:49:18 | 
| 62.210.37.15 | attackbots | Oct 10 09:37:38 rotator sshd\[12422\]: Failed password for root from 62.210.37.15 port 58194 ssh2Oct 10 09:37:40 rotator sshd\[12422\]: Failed password for root from 62.210.37.15 port 58194 ssh2Oct 10 09:37:42 rotator sshd\[12422\]: Failed password for root from 62.210.37.15 port 58194 ssh2Oct 10 09:37:45 rotator sshd\[12422\]: Failed password for root from 62.210.37.15 port 58194 ssh2Oct 10 09:37:47 rotator sshd\[12422\]: Failed password for root from 62.210.37.15 port 58194 ssh2Oct 10 09:37:49 rotator sshd\[12422\]: Failed password for root from 62.210.37.15 port 58194 ssh2 ...  | 
                    2019-10-10 16:56:22 | 
| 13.67.107.6 | attack | Oct 10 04:08:07 www_kotimaassa_fi sshd[32442]: Failed password for root from 13.67.107.6 port 44012 ssh2 ...  | 
                    2019-10-10 16:35:48 | 
| 178.128.24.84 | attack | Oct 7 23:44:31 www6-3 sshd[8060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.24.84 user=r.r Oct 7 23:44:33 www6-3 sshd[8060]: Failed password for r.r from 178.128.24.84 port 60016 ssh2 Oct 7 23:44:33 www6-3 sshd[8060]: Received disconnect from 178.128.24.84 port 60016:11: Bye Bye [preauth] Oct 7 23:44:33 www6-3 sshd[8060]: Disconnected from 178.128.24.84 port 60016 [preauth] Oct 8 00:04:36 www6-3 sshd[8927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.24.84 user=r.r Oct 8 00:04:39 www6-3 sshd[8927]: Failed password for r.r from 178.128.24.84 port 44778 ssh2 Oct 8 00:04:39 www6-3 sshd[8927]: Received disconnect from 178.128.24.84 port 44778:11: Bye Bye [preauth] Oct 8 00:04:39 www6-3 sshd[8927]: Disconnected from 178.128.24.84 port 44778 [preauth] Oct 8 00:08:55 www6-3 sshd[9141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ru........ -------------------------------  | 
                    2019-10-10 16:45:23 | 
| 140.143.227.43 | attack | SSH bruteforce (Triggered fail2ban)  | 
                    2019-10-10 16:37:06 | 
| 115.159.185.71 | attackbots | 2019-10-10T06:32:45.103167abusebot-7.cloudsearch.cf sshd\[29288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.185.71 user=root  | 
                    2019-10-10 16:45:00 | 
| 178.214.92.98 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/178.214.92.98/ PS - 1H : (2) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : PS NAME ASN : ASN51336 IP : 178.214.92.98 CIDR : 178.214.64.0/19 PREFIX COUNT : 13 UNIQUE IP COUNT : 18432 WYKRYTE ATAKI Z ASN51336 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-10-10 05:48:42 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery  | 
                    2019-10-10 16:36:20 | 
| 52.187.131.27 | attackbotsspam | 2019-10-10T08:54:03.273153abusebot-7.cloudsearch.cf sshd\[29914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.131.27 user=root  | 
                    2019-10-10 17:02:38 |