City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.168.254.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38314
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.168.254.205. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 12:58:13 CST 2025
;; MSG SIZE rcvd: 107
205.254.168.45.in-addr.arpa domain name pointer 45.168.254.205.wdtelecom.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
205.254.168.45.in-addr.arpa name = 45.168.254.205.wdtelecom.com.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 58.218.66.92 | attackspambots | 22/tcp 8080/tcp 3306/tcp... [2019-06-29/07-07]97pkt,3pt.(tcp) |
2019-07-08 12:41:44 |
| 92.246.76.133 | attackspam | Brute forcing RDP port 3389 |
2019-07-08 12:11:52 |
| 106.107.178.50 | attackbotsspam | Unauthorized connection attempt from IP address 106.107.178.50 on Port 445(SMB) |
2019-07-08 12:53:10 |
| 14.142.25.74 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-07 19:15:59,624 INFO [shellcode_manager] (14.142.25.74) no match, writing hexdump (a91a34d634d05acfb58f4774b3f612ac :2066442) - MS17010 (EternalBlue) |
2019-07-08 12:25:57 |
| 129.205.208.21 | attackbotsspam | SSH Bruteforce |
2019-07-08 12:31:05 |
| 77.234.195.123 | attackspambots | [portscan] Port scan |
2019-07-08 12:19:52 |
| 41.228.12.149 | attack | 2019-06-14T21:53:45.472899wiz-ks3 sshd[27379]: Invalid user craven from 41.228.12.149 port 44255 2019-06-14T21:53:45.474957wiz-ks3 sshd[27379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.228.12.149 2019-06-14T21:53:45.472899wiz-ks3 sshd[27379]: Invalid user craven from 41.228.12.149 port 44255 2019-06-14T21:53:47.394608wiz-ks3 sshd[27379]: Failed password for invalid user craven from 41.228.12.149 port 44255 ssh2 2019-06-14T21:53:45.474957wiz-ks3 sshd[27379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.228.12.149 2019-06-14T21:53:45.472899wiz-ks3 sshd[27379]: Invalid user craven from 41.228.12.149 port 44255 2019-06-14T21:53:47.394608wiz-ks3 sshd[27379]: Failed password for invalid user craven from 41.228.12.149 port 44255 ssh2 ... |
2019-07-08 12:12:50 |
| 66.96.205.52 | attack | 2019-07-08T05:01:07.567886ns1.unifynetsol.net postfix/smtpd\[23619\]: warning: unknown\[66.96.205.52\]: SASL LOGIN authentication failed: authentication failure 2019-07-08T05:01:09.953499ns1.unifynetsol.net postfix/smtpd\[28173\]: warning: unknown\[66.96.205.52\]: SASL LOGIN authentication failed: authentication failure 2019-07-08T05:01:12.090083ns1.unifynetsol.net postfix/smtpd\[29705\]: warning: unknown\[66.96.205.52\]: SASL LOGIN authentication failed: authentication failure 2019-07-08T05:01:14.501231ns1.unifynetsol.net postfix/smtpd\[23619\]: warning: unknown\[66.96.205.52\]: SASL LOGIN authentication failed: authentication failure 2019-07-08T05:01:16.176651ns1.unifynetsol.net postfix/smtpd\[29705\]: warning: unknown\[66.96.205.52\]: SASL LOGIN authentication failed: authentication failure |
2019-07-08 12:43:06 |
| 38.101.225.164 | attackbotsspam | Unauthorized connection attempt from IP address 38.101.225.164 on Port 445(SMB) |
2019-07-08 12:39:35 |
| 100.43.85.102 | attackbotsspam | EventTime:Mon Jul 8 09:00:55 AEST 2019,Protocol:UDP,VendorEventCode:RT_FLOW_SESSION_DENY,TargetPort:53,SourceIP:100.43.85.102,SourcePort:57786 |
2019-07-08 12:11:26 |
| 218.4.163.146 | attack | Jul 1 22:35:25 *** sshd[11507]: Invalid user svn from 218.4.163.146 port 52272 Jul 1 22:35:27 *** sshd[11507]: Failed password for invalid user svn from 218.4.163.146 port 52272 ssh2 Jul 1 22:35:27 *** sshd[11507]: Received disconnect from 218.4.163.146 port 52272:11: Bye Bye [preauth] Jul 1 22:35:27 *** sshd[11507]: Disconnected from 218.4.163.146 port 52272 [preauth] Jul 1 22:39:38 *** sshd[16308]: Invalid user simon from 218.4.163.146 port 45683 Jul 1 22:39:40 *** sshd[16308]: Failed password for invalid user simon from 218.4.163.146 port 45683 ssh2 Jul 1 22:39:41 *** sshd[16308]: Received disconnect from 218.4.163.146 port 45683:11: Bye Bye [preauth] Jul 1 22:39:41 *** sshd[16308]: Disconnected from 218.4.163.146 port 45683 [preauth] Jul 1 22:44:23 *** sshd[21937]: Invalid user seth from 2 .... truncated .... Jul 1 22:35:25 *** sshd[11507]: Invalid user svn from 218.4.163.146 port 52272 Jul 1 22:35:27 *** sshd[11507]: Failed password for invalid user sv........ ------------------------------- |
2019-07-08 12:35:45 |
| 41.32.252.4 | attack | Unauthorized connection attempt from IP address 41.32.252.4 on Port 445(SMB) |
2019-07-08 12:28:42 |
| 95.134.189.66 | attack | Unauthorized connection attempt from IP address 95.134.189.66 on Port 445(SMB) |
2019-07-08 12:56:41 |
| 201.39.188.70 | attackspambots | Unauthorized connection attempt from IP address 201.39.188.70 on Port 445(SMB) |
2019-07-08 12:36:18 |
| 112.229.45.122 | attackspambots | Invalid user pi from 112.229.45.122 port 47838 Invalid user pi from 112.229.45.122 port 47840 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.229.45.122 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.229.45.122 Failed password for invalid user pi from 112.229.45.122 port 47838 ssh2 |
2019-07-08 12:49:42 |