City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.139.74.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.139.74.32. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 19:28:08 CST 2025
;; MSG SIZE rcvd: 105
32.74.139.85.in-addr.arpa domain name pointer a85-139-74-32.cpe.netcabo.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
32.74.139.85.in-addr.arpa name = a85-139-74-32.cpe.netcabo.pt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.30.112 | attackspam | May 4 17:53:19 dev0-dcde-rnet sshd[5927]: Failed password for root from 222.186.30.112 port 54767 ssh2 May 4 17:53:29 dev0-dcde-rnet sshd[5934]: Failed password for root from 222.186.30.112 port 32053 ssh2 May 4 17:53:32 dev0-dcde-rnet sshd[5934]: Failed password for root from 222.186.30.112 port 32053 ssh2 |
2020-05-04 23:56:43 |
| 46.217.103.104 | attack | 46.217.103.104 - - [04/May/2020:14:12:35 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 46.217.103.104 - - [04/May/2020:14:12:42 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 46.217.103.104 - - [04/May/2020:14:12:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-05-04 23:38:55 |
| 138.118.4.168 | attackspambots | (sshd) Failed SSH login from 138.118.4.168 (BR/Brazil/cliente-168.netsulonline.com.br): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 4 16:50:18 amsweb01 sshd[21057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.118.4.168 user=root May 4 16:50:20 amsweb01 sshd[21057]: Failed password for root from 138.118.4.168 port 50276 ssh2 May 4 16:56:47 amsweb01 sshd[21515]: Invalid user 07 from 138.118.4.168 port 39798 May 4 16:56:49 amsweb01 sshd[21515]: Failed password for invalid user 07 from 138.118.4.168 port 39798 ssh2 May 4 17:00:49 amsweb01 sshd[21822]: Invalid user sophia from 138.118.4.168 port 32870 |
2020-05-04 23:40:36 |
| 149.202.13.50 | attackbotsspam | May 4 16:33:14 legacy sshd[25519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.13.50 May 4 16:33:16 legacy sshd[25519]: Failed password for invalid user yizhi from 149.202.13.50 port 43558 ssh2 May 4 16:36:55 legacy sshd[25706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.13.50 ... |
2020-05-04 23:46:20 |
| 94.73.253.29 | attackspam | $f2bV_matches |
2020-05-04 23:44:39 |
| 13.78.131.155 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2020-05-04 23:54:32 |
| 190.119.190.122 | attack | May 4 17:17:08 server sshd[6902]: Failed password for root from 190.119.190.122 port 49346 ssh2 May 4 17:32:43 server sshd[7539]: Failed password for invalid user thomas from 190.119.190.122 port 38354 ssh2 May 4 17:39:03 server sshd[7853]: Failed password for invalid user lager from 190.119.190.122 port 38114 ssh2 |
2020-05-04 23:59:45 |
| 189.18.236.120 | attack | May 4 17:08:37 ns382633 sshd\[15379\]: Invalid user tttserver from 189.18.236.120 port 39540 May 4 17:08:37 ns382633 sshd\[15379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.18.236.120 May 4 17:08:39 ns382633 sshd\[15379\]: Failed password for invalid user tttserver from 189.18.236.120 port 39540 ssh2 May 4 17:14:10 ns382633 sshd\[16432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.18.236.120 user=root May 4 17:14:12 ns382633 sshd\[16432\]: Failed password for root from 189.18.236.120 port 48608 ssh2 |
2020-05-04 23:26:37 |
| 182.61.136.167 | attackbotsspam | May 4 14:36:30 |
2020-05-04 23:33:09 |
| 142.93.137.144 | attack | May 4 17:05:07 rotator sshd\[19841\]: Invalid user alex from 142.93.137.144May 4 17:05:09 rotator sshd\[19841\]: Failed password for invalid user alex from 142.93.137.144 port 57254 ssh2May 4 17:07:56 rotator sshd\[20462\]: Invalid user kd from 142.93.137.144May 4 17:07:59 rotator sshd\[20462\]: Failed password for invalid user kd from 142.93.137.144 port 52280 ssh2May 4 17:10:53 rotator sshd\[21263\]: Invalid user yrd from 142.93.137.144May 4 17:10:56 rotator sshd\[21263\]: Failed password for invalid user yrd from 142.93.137.144 port 47318 ssh2 ... |
2020-05-04 23:37:53 |
| 106.13.58.178 | attack | May 4 09:09:05 ny01 sshd[21129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.58.178 May 4 09:09:07 ny01 sshd[21129]: Failed password for invalid user wwwtest from 106.13.58.178 port 49056 ssh2 May 4 09:12:57 ny01 sshd[21607]: Failed password for root from 106.13.58.178 port 38924 ssh2 |
2020-05-04 23:24:53 |
| 153.122.153.200 | attackspam | TCP src-port=36004 dst-port=25 Listed on dnsbl-sorbs barracuda spam-sorbs (217) |
2020-05-04 23:55:45 |
| 51.75.126.115 | attackspam | 2020-05-04T13:10:09.378922ionos.janbro.de sshd[118546]: Invalid user test from 51.75.126.115 port 35974 2020-05-04T13:10:11.256277ionos.janbro.de sshd[118546]: Failed password for invalid user test from 51.75.126.115 port 35974 ssh2 2020-05-04T13:14:03.002923ionos.janbro.de sshd[118549]: Invalid user camera from 51.75.126.115 port 44476 2020-05-04T13:14:03.088932ionos.janbro.de sshd[118549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.126.115 2020-05-04T13:14:03.002923ionos.janbro.de sshd[118549]: Invalid user camera from 51.75.126.115 port 44476 2020-05-04T13:14:04.307212ionos.janbro.de sshd[118549]: Failed password for invalid user camera from 51.75.126.115 port 44476 ssh2 2020-05-04T13:17:40.306487ionos.janbro.de sshd[118557]: Invalid user abu from 51.75.126.115 port 52984 2020-05-04T13:17:40.387877ionos.janbro.de sshd[118557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.126.115 2020- ... |
2020-05-04 23:36:55 |
| 180.76.56.108 | attackspambots | W 5701,/var/log/auth.log,-,- |
2020-05-04 23:53:15 |
| 185.50.149.25 | attackbotsspam | 2020-05-04 17:42:38 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data \(set_id=bt@opso.it\) 2020-05-04 17:42:50 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data \(set_id=bt\) 2020-05-04 17:43:50 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data \(set_id=inarcassaonline@opso.it\) 2020-05-04 17:43:57 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data 2020-05-04 17:44:06 dovecot_login authenticator failed for \(\[185.50.149.25\]\) \[185.50.149.25\]: 535 Incorrect authentication data |
2020-05-04 23:47:40 |