City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.169.155.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.169.155.211. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 07:34:26 CST 2025
;; MSG SIZE rcvd: 107
211.155.169.45.in-addr.arpa domain name pointer 45-169-155-211.snetfibra.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
211.155.169.45.in-addr.arpa name = 45-169-155-211.snetfibra.com.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 116.206.8.12 | attackspam | 1576853641 - 12/20/2019 15:54:01 Host: 116.206.8.12/116.206.8.12 Port: 445 TCP Blocked |
2019-12-21 00:37:50 |
| 40.92.65.80 | attackbots | Dec 20 17:53:51 debian-2gb-vpn-nbg1-1 kernel: [1231990.250106] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.65.80 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=10961 DF PROTO=TCP SPT=6159 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-21 00:45:34 |
| 212.90.170.166 | attack | Dec 20 15:54:27 debian-2gb-nbg1-2 kernel: \[506429.000548\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=212.90.170.166 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=2151 PROTO=TCP SPT=45676 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-12-21 00:14:47 |
| 218.92.0.173 | attack | Dec 20 10:25:22 plusreed sshd[5577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root Dec 20 10:25:24 plusreed sshd[5577]: Failed password for root from 218.92.0.173 port 60677 ssh2 Dec 20 10:25:33 plusreed sshd[5577]: Failed password for root from 218.92.0.173 port 60677 ssh2 Dec 20 10:25:22 plusreed sshd[5577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root Dec 20 10:25:24 plusreed sshd[5577]: Failed password for root from 218.92.0.173 port 60677 ssh2 Dec 20 10:25:33 plusreed sshd[5577]: Failed password for root from 218.92.0.173 port 60677 ssh2 Dec 20 10:25:22 plusreed sshd[5577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root Dec 20 10:25:24 plusreed sshd[5577]: Failed password for root from 218.92.0.173 port 60677 ssh2 Dec 20 10:25:33 plusreed sshd[5577]: Failed password for root from 218.92.0.173 port 60677 ssh2 D |
2019-12-21 00:05:20 |
| 14.207.73.169 | attackbotsspam | Unauthorized connection attempt detected from IP address 14.207.73.169 to port 445 |
2019-12-21 00:29:53 |
| 157.52.182.111 | attackbotsspam | forum spam (shoes) |
2019-12-21 00:03:15 |
| 63.41.36.219 | attack | Dec 20 15:50:29 tux-35-217 sshd\[29490\]: Invalid user mysql from 63.41.36.219 port 43308 Dec 20 15:50:29 tux-35-217 sshd\[29490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.41.36.219 Dec 20 15:50:32 tux-35-217 sshd\[29490\]: Failed password for invalid user mysql from 63.41.36.219 port 43308 ssh2 Dec 20 15:54:35 tux-35-217 sshd\[29503\]: Invalid user andrine from 63.41.36.219 port 50692 Dec 20 15:54:35 tux-35-217 sshd\[29503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.41.36.219 ... |
2019-12-21 00:07:56 |
| 106.12.10.203 | attackspam | Honeypot hit, critical abuseConfidenceScore, incoming Traffic from this IP |
2019-12-21 00:07:35 |
| 139.59.18.215 | attackbots | Dec 20 06:39:42 hpm sshd\[23886\]: Invalid user qwerty from 139.59.18.215 Dec 20 06:39:42 hpm sshd\[23886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.215 Dec 20 06:39:44 hpm sshd\[23886\]: Failed password for invalid user qwerty from 139.59.18.215 port 60846 ssh2 Dec 20 06:46:01 hpm sshd\[24487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.215 user=root Dec 20 06:46:03 hpm sshd\[24487\]: Failed password for root from 139.59.18.215 port 39560 ssh2 |
2019-12-21 00:49:52 |
| 206.189.142.10 | attackbots | ssh intrusion attempt |
2019-12-21 00:42:33 |
| 223.71.139.99 | attackbots | Dec 20 05:55:37 php1 sshd\[14178\]: Invalid user server from 223.71.139.99 Dec 20 05:55:37 php1 sshd\[14178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.99 Dec 20 05:55:39 php1 sshd\[14178\]: Failed password for invalid user server from 223.71.139.99 port 51062 ssh2 Dec 20 06:03:15 php1 sshd\[15118\]: Invalid user nfs from 223.71.139.99 Dec 20 06:03:15 php1 sshd\[15118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.99 |
2019-12-21 00:19:43 |
| 206.81.11.216 | attackbotsspam | Dec 20 17:29:21 rotator sshd\[17808\]: Invalid user philippi from 206.81.11.216Dec 20 17:29:22 rotator sshd\[17808\]: Failed password for invalid user philippi from 206.81.11.216 port 40720 ssh2Dec 20 17:34:10 rotator sshd\[18604\]: Invalid user asterisk from 206.81.11.216Dec 20 17:34:13 rotator sshd\[18604\]: Failed password for invalid user asterisk from 206.81.11.216 port 47616 ssh2Dec 20 17:38:57 rotator sshd\[19398\]: Invalid user takasima from 206.81.11.216Dec 20 17:38:59 rotator sshd\[19398\]: Failed password for invalid user takasima from 206.81.11.216 port 54672 ssh2 ... |
2019-12-21 00:39:57 |
| 40.92.9.71 | attackspambots | Dec 20 17:54:11 debian-2gb-vpn-nbg1-1 kernel: [1232009.914548] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.9.71 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=232 ID=10633 DF PROTO=TCP SPT=45957 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-21 00:28:59 |
| 188.254.0.170 | attackbots | Dec 20 06:01:50 sachi sshd\[25050\]: Invalid user merrer from 188.254.0.170 Dec 20 06:01:50 sachi sshd\[25050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.170 Dec 20 06:01:52 sachi sshd\[25050\]: Failed password for invalid user merrer from 188.254.0.170 port 42264 ssh2 Dec 20 06:06:57 sachi sshd\[25515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.170 user=root Dec 20 06:06:59 sachi sshd\[25515\]: Failed password for root from 188.254.0.170 port 46102 ssh2 |
2019-12-21 00:15:16 |
| 94.238.22.29 | attackspam | Dec 20 16:15:46 IngegnereFirenze sshd[11279]: User root from 94.238.22.29 not allowed because not listed in AllowUsers ... |
2019-12-21 00:17:39 |