City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.5.237.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.5.237.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 20:31:28 CST 2025
;; MSG SIZE rcvd: 104
40.237.5.45.in-addr.arpa domain name pointer 45-5-237-40.jerenet.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.237.5.45.in-addr.arpa name = 45-5-237-40.jerenet.com.br.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 181.174.167.68 | attackspam | Oct 3 15:11:41 localhost kernel: [3867720.419530] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=181.174.167.68 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=85 ID=44874 DF PROTO=TCP SPT=53648 DPT=22 SEQ=3887706990 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 3 15:52:48 localhost kernel: [3870187.888008] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=181.174.167.68 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=81 ID=52730 DF PROTO=TCP SPT=54651 DPT=22 SEQ=3670523164 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 3 16:53:53 localhost kernel: [3873852.308896] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=181.174.167.68 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=69 ID=33271 DF PROTO=TCP SPT=52412 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 3 16:53:53 localhost kernel: [3873852.308903] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=181.174.167.68 DST=[mun |
2019-10-04 05:05:19 |
| 221.10.253.72 | attackbots | Oct 3 22:58:46 MK-Soft-Root2 sshd[17772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.10.253.72 Oct 3 22:58:48 MK-Soft-Root2 sshd[17772]: Failed password for invalid user postgres from 221.10.253.72 port 45438 ssh2 ... |
2019-10-04 05:09:42 |
| 124.16.139.243 | attack | Automated report - ssh fail2ban: Oct 3 22:49:32 authentication failure Oct 3 22:49:34 wrong password, user=danuser, port=39318, ssh2 Oct 3 22:53:51 authentication failure |
2019-10-04 05:06:29 |
| 112.133.204.221 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-10-04 04:47:32 |
| 67.27.153.254 | attack | TCP Port: 80 _ invalid blocked zen-spamhaus also rbldns-ru _ _ Client xx.xx.4.125 _ _ (437) |
2019-10-04 04:49:21 |
| 193.31.24.113 | attackspambots | 10/03/2019-22:54:02.428411 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-10-04 04:57:04 |
| 92.118.160.37 | attackspambots | 10/03/2019-15:20:11.720045 92.118.160.37 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-04 04:50:11 |
| 92.118.160.45 | attackspambots | Automatic report - Port Scan Attack |
2019-10-04 04:39:25 |
| 113.190.235.143 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 03-10-2019 13:20:23. |
2019-10-04 04:47:06 |
| 92.118.160.41 | attackspambots | Automatic report - Port Scan Attack |
2019-10-04 04:45:31 |
| 27.92.118.95 | attackbotsspam | Oct 3 11:06:57 sachi sshd\[5951\]: Invalid user userftp from 27.92.118.95 Oct 3 11:06:57 sachi sshd\[5951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kd027092118095.ppp-bb.dion.ne.jp Oct 3 11:06:59 sachi sshd\[5951\]: Failed password for invalid user userftp from 27.92.118.95 port 40453 ssh2 Oct 3 11:11:30 sachi sshd\[6385\]: Invalid user sambaup from 27.92.118.95 Oct 3 11:11:30 sachi sshd\[6385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kd027092118095.ppp-bb.dion.ne.jp |
2019-10-04 05:13:03 |
| 185.234.219.83 | attack | Oct 3 23:09:45 elektron postfix/smtpd\[32109\]: warning: unknown\[185.234.219.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 23:23:29 elektron postfix/smtpd\[2062\]: warning: unknown\[185.234.219.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 23:37:06 elektron postfix/smtpd\[964\]: warning: unknown\[185.234.219.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-10-04 04:41:44 |
| 119.29.203.106 | attack | Oct 3 16:55:04 debian sshd\[22849\]: Invalid user frederick from 119.29.203.106 port 41750 Oct 3 16:55:04 debian sshd\[22849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.203.106 Oct 3 16:55:06 debian sshd\[22849\]: Failed password for invalid user frederick from 119.29.203.106 port 41750 ssh2 ... |
2019-10-04 04:56:03 |
| 184.22.79.235 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 03-10-2019 13:20:26. |
2019-10-04 04:41:58 |
| 185.211.245.198 | attack | Oct 3 22:49:51 relay postfix/smtpd\[12485\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 22:56:49 relay postfix/smtpd\[28923\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 22:57:00 relay postfix/smtpd\[28969\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 23:01:33 relay postfix/smtpd\[28968\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 3 23:01:41 relay postfix/smtpd\[28969\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-10-04 05:11:54 |