City: Ituiutaba
Region: Minas Gerais
Country: Brazil
Internet Service Provider: Algar Telecom
Hostname: unknown
Organization: ALGAR TELECOM S/A
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 201.48.148.26 | attackbots | Unauthorized connection attempt detected from IP address 201.48.148.26 to port 445 [T] |
2020-08-16 19:57:47 |
| 201.48.143.14 | attack | Honeypot attack, port: 445, PTR: 201-048-143-014.static.ctbctelecom.com.br. |
2020-07-25 23:39:44 |
| 201.48.147.177 | attack | Unauthorized connection attempt detected from IP address 201.48.147.177 to port 1433 [T] |
2020-07-22 02:04:58 |
| 201.48.142.167 | attackbots | [portscan] tcp/1433 [MsSQL] *(RWIN=1024)(03031155) |
2020-03-03 20:46:50 |
| 201.48.142.8 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-03-02 07:18:32 |
| 201.48.148.26 | attack | Unauthorized connection attempt detected from IP address 201.48.148.26 to port 445 |
2020-02-09 05:37:58 |
| 201.48.143.246 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 06-02-2020 13:45:17. |
2020-02-06 23:32:49 |
| 201.48.142.117 | attackbots | trying to access non-authorized port |
2020-02-03 00:58:07 |
| 201.48.143.246 | attackspambots | Honeypot attack, port: 445, PTR: 201-048-143-246.static.ctbctelecom.com.br. |
2020-01-28 19:32:00 |
| 201.48.143.84 | attack | Unauthorized connection attempt detected from IP address 201.48.143.84 to port 88 [J] |
2020-01-19 17:11:59 |
| 201.48.147.177 | attack | Honeypot attack, port: 445, PTR: 201-048-147-177.static.ctbctelecom.com.br. |
2020-01-10 08:04:52 |
| 201.48.143.0 | attackspam | Unauthorized connection attempt from IP address 201.48.143.0 on Port 445(SMB) |
2019-12-06 08:45:12 |
| 201.48.142.63 | attack | email spam |
2019-11-08 22:37:03 |
| 201.48.142.161 | attackbots | 445/tcp [2019-09-04]1pkt |
2019-09-05 09:08:37 |
| 201.48.143.139 | attackbotsspam | 2 pkts, ports: TCP:445 |
2019-09-03 01:23:01 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.48.14.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49283
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.48.14.45. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019050900 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu May 09 20:04:52 +08 2019
;; MSG SIZE rcvd: 116
45.14.48.201.in-addr.arpa domain name pointer 201-048-014-045.static.ctbctelecom.com.br.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
45.14.48.201.in-addr.arpa name = 201-048-014-045.static.ctbctelecom.com.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 82.117.245.189 | attack | Jul 18 07:46:26 MK-Soft-VM5 sshd\[2108\]: Invalid user ftpuser from 82.117.245.189 port 50596 Jul 18 07:46:26 MK-Soft-VM5 sshd\[2108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.117.245.189 Jul 18 07:46:28 MK-Soft-VM5 sshd\[2108\]: Failed password for invalid user ftpuser from 82.117.245.189 port 50596 ssh2 ... |
2019-07-18 16:48:11 |
| 59.25.197.162 | attackbotsspam | Jul 18 07:13:25 vmd17057 sshd\[23441\]: Invalid user user from 59.25.197.162 port 40514 Jul 18 07:13:25 vmd17057 sshd\[23441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.162 Jul 18 07:13:27 vmd17057 sshd\[23441\]: Failed password for invalid user user from 59.25.197.162 port 40514 ssh2 ... |
2019-07-18 17:05:54 |
| 220.180.223.138 | attackbotsspam | TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-18 03:14:19] |
2019-07-18 16:52:51 |
| 96.1.105.126 | attackspambots | Jul 15 19:29:33 proxmox sshd[30673]: Invalid user oracle from 96.1.105.126 port 49342 Jul 15 19:29:33 proxmox sshd[30673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.1.105.126 Jul 15 19:29:35 proxmox sshd[30673]: Failed password for invalid user oracle from 96.1.105.126 port 49342 ssh2 Jul 15 19:29:35 proxmox sshd[30673]: Received disconnect from 96.1.105.126 port 49342:11: Bye Bye [preauth] Jul 15 19:29:35 proxmox sshd[30673]: Disconnected from 96.1.105.126 port 49342 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=96.1.105.126 |
2019-07-18 17:27:08 |
| 189.125.2.234 | attackbotsspam | Jul 18 10:43:52 nextcloud sshd\[31232\]: Invalid user pinturabh from 189.125.2.234 Jul 18 10:43:52 nextcloud sshd\[31232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.2.234 Jul 18 10:43:53 nextcloud sshd\[31232\]: Failed password for invalid user pinturabh from 189.125.2.234 port 36516 ssh2 ... |
2019-07-18 17:17:43 |
| 45.227.253.213 | attack | Jul 18 10:43:16 mailserver dovecot: auth-worker(79526): sql([hidden],45.227.253.213): Password mismatch Jul 18 10:43:18 mailserver postfix/smtps/smtpd[79528]: warning: unknown[45.227.253.213]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 10:43:18 mailserver postfix/smtps/smtpd[79528]: lost connection after AUTH from unknown[45.227.253.213] Jul 18 10:43:18 mailserver postfix/smtps/smtpd[79528]: disconnect from unknown[45.227.253.213] Jul 18 10:43:18 mailserver postfix/smtps/smtpd[79528]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.213: hostname nor servname provided, or not known Jul 18 10:43:18 mailserver postfix/smtps/smtpd[79528]: connect from unknown[45.227.253.213] Jul 18 10:43:27 mailserver dovecot: auth-worker(79526): sql([hidden],45.227.253.213): unknown user Jul 18 10:43:29 mailserver postfix/smtps/smtpd[79528]: warning: unknown[45.227.253.213]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 18 10:43:29 mailserver postfix/smtps/smtpd[79528]: lost |
2019-07-18 17:09:19 |
| 181.120.246.83 | attackspam | Jul 18 10:51:58 legacy sshd[9910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.120.246.83 Jul 18 10:52:00 legacy sshd[9910]: Failed password for invalid user gg from 181.120.246.83 port 47558 ssh2 Jul 18 10:59:03 legacy sshd[10155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.120.246.83 ... |
2019-07-18 17:11:53 |
| 180.254.248.101 | attack | SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-07-18 17:20:18 |
| 162.247.74.204 | attackspam | Jul 18 10:19:19 lnxded63 sshd[11721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.204 Jul 18 10:19:22 lnxded63 sshd[11721]: Failed password for invalid user admin from 162.247.74.204 port 53174 ssh2 Jul 18 10:19:24 lnxded63 sshd[11721]: Failed password for invalid user admin from 162.247.74.204 port 53174 ssh2 Jul 18 10:19:27 lnxded63 sshd[11721]: Failed password for invalid user admin from 162.247.74.204 port 53174 ssh2 |
2019-07-18 16:50:17 |
| 190.13.173.67 | attackbotsspam | Jul 18 05:15:01 vps200512 sshd\[30148\]: Invalid user www from 190.13.173.67 Jul 18 05:15:01 vps200512 sshd\[30148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.173.67 Jul 18 05:15:03 vps200512 sshd\[30148\]: Failed password for invalid user www from 190.13.173.67 port 60500 ssh2 Jul 18 05:20:46 vps200512 sshd\[30317\]: Invalid user fit from 190.13.173.67 Jul 18 05:20:46 vps200512 sshd\[30317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.173.67 |
2019-07-18 17:23:24 |
| 201.77.141.95 | attack | Jul 16 09:35:13 s02-markstaller sshd[24606]: Invalid user ade from 201.77.141.95 Jul 16 09:35:16 s02-markstaller sshd[24606]: Failed password for invalid user ade from 201.77.141.95 port 38792 ssh2 Jul 16 09:46:42 s02-markstaller sshd[24996]: Invalid user testuser from 201.77.141.95 Jul 16 09:46:44 s02-markstaller sshd[24996]: Failed password for invalid user testuser from 201.77.141.95 port 60991 ssh2 Jul 16 09:52:02 s02-markstaller sshd[25144]: Invalid user steve from 201.77.141.95 Jul 16 09:52:03 s02-markstaller sshd[25144]: Failed password for invalid user steve from 201.77.141.95 port 57976 ssh2 Jul 16 09:57:24 s02-markstaller sshd[25337]: Invalid user mj from 201.77.141.95 Jul 16 09:57:27 s02-markstaller sshd[25337]: Failed password for invalid user mj from 201.77.141.95 port 54962 ssh2 Jul 16 10:02:44 s02-markstaller sshd[25510]: Invalid user abe from 201.77.141.95 Jul 16 10:02:47 s02-markstaller sshd[25510]: Failed password for invalid user abe from 201.77.141.95........ ------------------------------ |
2019-07-18 16:42:18 |
| 192.241.220.228 | attackbots | $f2bV_matches |
2019-07-18 17:05:18 |
| 69.70.217.54 | attackspam | 1563412494 - 07/18/2019 03:14:54 Host: 69.70.217.54/69.70.217.54 Port: 143 TCP Blocked |
2019-07-18 17:18:56 |
| 188.166.235.192 | attackspambots | Attempted to login to my Synology NAS |
2019-07-18 17:01:27 |
| 115.28.76.22 | attackbotsspam | php WP PHPmyadamin ABUSE blocked for 12h |
2019-07-18 16:52:13 |