City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.171.239.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34945
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.171.239.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 03:53:44 CST 2025
;; MSG SIZE rcvd: 106
12.239.171.45.in-addr.arpa domain name pointer 12-239-171-45.teqnet.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.239.171.45.in-addr.arpa name = 12-239-171-45.teqnet.com.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.204.50.89 | attack | Oct 11 04:40:50 itv-usvr-01 sshd[21325]: Invalid user kay from 162.204.50.89 Oct 11 04:40:50 itv-usvr-01 sshd[21325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.204.50.89 Oct 11 04:40:50 itv-usvr-01 sshd[21325]: Invalid user kay from 162.204.50.89 Oct 11 04:40:52 itv-usvr-01 sshd[21325]: Failed password for invalid user kay from 162.204.50.89 port 35630 ssh2 Oct 11 04:45:39 itv-usvr-01 sshd[21533]: Invalid user postgresql from 162.204.50.89 |
2020-10-11 08:01:33 |
| 186.242.208.120 | attackspambots | Automatic report - Port Scan Attack |
2020-10-11 08:16:49 |
| 41.223.76.62 | attack | 41.223.76.62 - - [10/Oct/2020:23:39:49 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" 41.223.76.62 - - [10/Oct/2020:23:39:53 +0100] "POST /wp-login.php HTTP/1.1" 200 8955 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" 41.223.76.62 - - [10/Oct/2020:23:40:50 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" ... |
2020-10-11 07:47:35 |
| 111.229.85.222 | attackbotsspam | Oct 11 03:21:11 dhoomketu sshd[3736540]: Failed password for invalid user postgres5 from 111.229.85.222 port 35364 ssh2 Oct 11 03:25:35 dhoomketu sshd[3736658]: Invalid user 1web from 111.229.85.222 port 60784 Oct 11 03:25:35 dhoomketu sshd[3736658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.85.222 Oct 11 03:25:35 dhoomketu sshd[3736658]: Invalid user 1web from 111.229.85.222 port 60784 Oct 11 03:25:37 dhoomketu sshd[3736658]: Failed password for invalid user 1web from 111.229.85.222 port 60784 ssh2 ... |
2020-10-11 07:47:02 |
| 213.141.157.220 | attackspam | Oct 11 02:21:58 dignus sshd[29494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.141.157.220 Oct 11 02:22:00 dignus sshd[29494]: Failed password for invalid user oracle from 213.141.157.220 port 39092 ssh2 Oct 11 02:25:33 dignus sshd[29550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.141.157.220 user=root Oct 11 02:25:35 dignus sshd[29550]: Failed password for root from 213.141.157.220 port 43620 ssh2 Oct 11 02:29:04 dignus sshd[29614]: Invalid user monitor from 213.141.157.220 port 48138 ... |
2020-10-11 08:02:45 |
| 141.98.9.32 | attack | Oct 11 00:01:52 scw-tender-jepsen sshd[22781]: Failed password for root from 141.98.9.32 port 37533 ssh2 |
2020-10-11 08:14:14 |
| 186.209.90.25 | attack | Unauthorized connection attempt from IP address 186.209.90.25 on Port 445(SMB) |
2020-10-11 07:53:17 |
| 218.92.0.200 | attack | Oct 10 23:43:51 rush sshd[30056]: Failed password for root from 218.92.0.200 port 33671 ssh2 Oct 10 23:44:50 rush sshd[30066]: Failed password for root from 218.92.0.200 port 21863 ssh2 Oct 10 23:44:52 rush sshd[30066]: Failed password for root from 218.92.0.200 port 21863 ssh2 ... |
2020-10-11 07:52:21 |
| 173.254.225.93 | attack | Oct 10 19:04:02 shivevps sshd[2601]: Failed password for invalid user arthur from 173.254.225.93 port 53748 ssh2 Oct 10 19:12:32 shivevps sshd[3027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.254.225.93 user=root Oct 10 19:12:34 shivevps sshd[3027]: Failed password for root from 173.254.225.93 port 56402 ssh2 ... |
2020-10-11 08:13:44 |
| 218.59.47.1 | attackspam | [MK-VM4] Blocked by UFW |
2020-10-11 08:18:10 |
| 104.237.157.11 | attackspambots | Use Brute-Force |
2020-10-11 08:00:58 |
| 104.248.156.168 | attackbots | Lines containing failures of 104.248.156.168 Oct 7 20:22:51 shared04 sshd[3452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.156.168 user=r.r Oct 7 20:22:53 shared04 sshd[3452]: Failed password for r.r from 104.248.156.168 port 52306 ssh2 Oct 7 20:22:53 shared04 sshd[3452]: Received disconnect from 104.248.156.168 port 52306:11: Bye Bye [preauth] Oct 7 20:22:53 shared04 sshd[3452]: Disconnected from authenticating user r.r 104.248.156.168 port 52306 [preauth] Oct 7 20:31:33 shared04 sshd[7115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.156.168 user=r.r Oct 7 20:31:35 shared04 sshd[7115]: Failed password for r.r from 104.248.156.168 port 50240 ssh2 Oct 7 20:31:35 shared04 sshd[7115]: Received disconnect from 104.248.156.168 port 50240:11: Bye Bye [preauth] Oct 7 20:31:35 shared04 sshd[7115]: Disconnected from authenticating user r.r 104.248.156.168 port 5024........ ------------------------------ |
2020-10-11 07:50:20 |
| 12.244.146.242 | attackbotsspam | Oct 10 16:27:41 pixelmemory sshd[3936257]: Invalid user uupc from 12.244.146.242 port 36480 Oct 10 16:27:41 pixelmemory sshd[3936257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.244.146.242 Oct 10 16:27:41 pixelmemory sshd[3936257]: Invalid user uupc from 12.244.146.242 port 36480 Oct 10 16:27:43 pixelmemory sshd[3936257]: Failed password for invalid user uupc from 12.244.146.242 port 36480 ssh2 Oct 10 16:31:17 pixelmemory sshd[3958042]: Invalid user cara from 12.244.146.242 port 10711 ... |
2020-10-11 08:19:36 |
| 132.148.121.32 | attackbots | [Sat Oct 10 22:47:19.372195 2020] [access_compat:error] [pid 4636] [client 132.148.121.32:53272] AH01797: client denied by server configuration: /var/www/plzenskypruvodce.cz/www/xmlrpc.php [Sat Oct 10 22:47:19.377160 2020] [access_compat:error] [pid 4637] [client 132.148.121.32:53270] AH01797: client denied by server configuration: /var/www/plzenskypruvodce.cz/www/xmlrpc.php ... |
2020-10-11 08:07:46 |
| 141.98.9.31 | attack | Oct 11 01:32:40 s2 sshd[24924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.31 Oct 11 01:32:43 s2 sshd[24924]: Failed password for invalid user 1234 from 141.98.9.31 port 49682 ssh2 Oct 11 01:33:08 s2 sshd[25002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.31 |
2020-10-11 07:54:08 |