City: Lisbon
Region: Lisbon
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: ANEXIA Internetdienstleistungs GmbH
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.146.14.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32048
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;217.146.14.135. IN A
;; AUTHORITY SECTION:
. 216 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019062704 1800 900 604800 86400
;; Query time: 321 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 28 09:53:36 CST 2019
;; MSG SIZE rcvd: 118
135.14.146.217.in-addr.arpa domain name pointer PT-LIS-ANX-R004.teamviewer.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
135.14.146.217.in-addr.arpa name = PT-LIS-ANX-R004.teamviewer.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
200.225.250.226 | attack | Brute forcing RDP port 3389 |
2020-06-14 03:07:41 |
175.157.243.177 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-06-14 02:41:54 |
54.36.108.162 | attack | Automatic report - Banned IP Access |
2020-06-14 03:00:35 |
36.92.95.10 | attackbots | Jun 13 15:03:33 ns41 sshd[15922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.95.10 |
2020-06-14 02:59:21 |
107.170.104.125 | attack | *Port Scan* detected from 107.170.104.125 (US/United States/New York/New York/www.jambcbttest.com). 4 hits in the last 120 seconds |
2020-06-14 02:54:02 |
123.206.174.21 | attack | Jun 13 21:11:56 hosting sshd[4502]: Invalid user HTTP from 123.206.174.21 port 13186 ... |
2020-06-14 03:12:15 |
85.209.150.186 | attackspam | pinterest spam |
2020-06-14 03:16:20 |
120.193.155.140 | attack | Attempted connection to port 1022. |
2020-06-14 02:51:55 |
106.12.202.180 | attackbotsspam | Jun 13 20:42:12 itv-usvr-01 sshd[31762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.180 user=root Jun 13 20:42:14 itv-usvr-01 sshd[31762]: Failed password for root from 106.12.202.180 port 39511 ssh2 Jun 13 20:45:54 itv-usvr-01 sshd[31880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.180 user=root Jun 13 20:45:56 itv-usvr-01 sshd[31880]: Failed password for root from 106.12.202.180 port 28988 ssh2 Jun 13 20:49:29 itv-usvr-01 sshd[32005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.180 user=root Jun 13 20:49:32 itv-usvr-01 sshd[32005]: Failed password for root from 106.12.202.180 port 18467 ssh2 |
2020-06-14 02:49:45 |
85.98.209.217 | attackspambots | Unauthorized connection attempt detected from IP address 85.98.209.217 to port 23 |
2020-06-14 02:50:09 |
122.53.18.90 | attackspambots | Icarus honeypot on github |
2020-06-14 03:02:06 |
206.189.128.215 | attack |
|
2020-06-14 03:04:16 |
118.189.74.228 | attack | Jun 13 15:05:20 server sshd[18577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.189.74.228 Jun 13 15:05:22 server sshd[18577]: Failed password for invalid user hjyim from 118.189.74.228 port 44318 ssh2 Jun 13 15:09:06 server sshd[19154]: Failed password for root from 118.189.74.228 port 42540 ssh2 ... |
2020-06-14 03:10:33 |
88.87.141.14 | attackbots | Jun 13 18:45:57 hell sshd[17345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.87.141.14 Jun 13 18:45:58 hell sshd[17345]: Failed password for invalid user guest from 88.87.141.14 port 40756 ssh2 ... |
2020-06-14 03:21:30 |
14.162.151.139 | attackbotsspam | Unauthorised connection attempt detected at AUO US MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-14 03:00:19 |