City: Prazins
Region: Braga
Country: Portugal
Internet Service Provider: NOS
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.205.95.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.205.95.135. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:50:20 CST 2025
;; MSG SIZE rcvd: 107
135.95.205.213.in-addr.arpa domain name pointer 213-205-95-135.net.novis.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
135.95.205.213.in-addr.arpa name = 213-205-95-135.net.novis.pt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 191.5.55.7 | attackspam | Oct 13 13:58:38 eventyay sshd[4073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.55.7 Oct 13 13:58:40 eventyay sshd[4073]: Failed password for invalid user okapon from 191.5.55.7 port 41233 ssh2 Oct 13 14:03:14 eventyay sshd[4281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.55.7 ... |
2020-10-14 00:49:22 |
| 92.63.197.53 | attack | firewall-block, port(s): 11020/tcp, 11021/tcp, 11301/tcp, 11302/tcp, 11303/tcp, 11345/tcp |
2020-10-14 00:22:42 |
| 209.141.33.122 | attackbotsspam | Invalid user admin from 209.141.33.122 port 43816 |
2020-10-14 00:10:48 |
| 125.91.126.92 | attack | Oct 13 16:17:10 hell sshd[17632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.126.92 Oct 13 16:17:13 hell sshd[17632]: Failed password for invalid user sms from 125.91.126.92 port 46098 ssh2 ... |
2020-10-14 00:44:02 |
| 49.232.86.244 | attack | various type of attack |
2020-10-14 00:53:11 |
| 175.24.67.217 | attack | Invalid user deployer from 175.24.67.217 port 33436 |
2020-10-14 00:47:43 |
| 122.194.229.54 | attackspam | 2020-10-13T18:02:16.335720news0 sshd[28778]: User root from 122.194.229.54 not allowed because not listed in AllowUsers 2020-10-13T18:02:16.653543news0 sshd[28778]: Failed none for invalid user root from 122.194.229.54 port 5450 ssh2 2020-10-13T18:02:19.007956news0 sshd[28778]: Failed password for invalid user root from 122.194.229.54 port 5450 ssh2 ... |
2020-10-14 00:12:05 |
| 58.87.125.133 | attackbotsspam | various type of attack |
2020-10-14 00:28:57 |
| 5.101.151.41 | attackbotsspam | Invalid user nagano from 5.101.151.41 port 63756 |
2020-10-14 00:33:47 |
| 164.163.253.86 | attack | Port scan on 1 port(s): 445 |
2020-10-14 00:34:40 |
| 157.245.98.160 | attackbotsspam | Oct 13 15:02:17 DAAP sshd[3064]: Invalid user pete from 157.245.98.160 port 57806 Oct 13 15:02:17 DAAP sshd[3064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.98.160 Oct 13 15:02:17 DAAP sshd[3064]: Invalid user pete from 157.245.98.160 port 57806 Oct 13 15:02:20 DAAP sshd[3064]: Failed password for invalid user pete from 157.245.98.160 port 57806 ssh2 Oct 13 15:06:19 DAAP sshd[3176]: Invalid user benedikt from 157.245.98.160 port 35168 ... |
2020-10-14 00:37:46 |
| 218.92.0.168 | attack | $f2bV_matches |
2020-10-14 00:25:01 |
| 14.232.160.213 | attackspam | Invalid user sysman from 14.232.160.213 port 40086 |
2020-10-14 00:27:26 |
| 222.82.250.5 | attack | various type of attack |
2020-10-14 00:40:46 |
| 84.229.18.62 | attackspam | Icarus honeypot on github |
2020-10-14 00:26:33 |