City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.245.158.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.245.158.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 05:34:30 CST 2025
;; MSG SIZE rcvd: 106
42.158.245.85.in-addr.arpa domain name pointer bl12-158-42.dsl.telepac.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.158.245.85.in-addr.arpa name = bl12-158-42.dsl.telepac.pt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 203.163.247.143 | attackbots | firewall-block, port(s): 25/tcp |
2019-11-22 20:40:30 |
| 182.247.61.71 | attackbotsspam | badbot |
2019-11-22 20:33:32 |
| 184.75.211.132 | attackbots | (From cisneros.hildegard@yahoo.com) Looking for effective online marketing that isn't completely full of it? Sorry to bug you on your contact form but actually that was kinda the point. We can send your promotional text to websites via their contact pages just like you're reading this note right now. You can specify targets by keyword or just fire off bulk blasts to sites in any country you choose. So let's say you need to blast an ad to all the mortgage brokers in the USA, we'll scrape websites for only those and post your ad message to them. As long as you're advertising a product or service that's relevant to that type of business then your business will get awesome results! Write a quickie email to evie2535gre@gmail.com to get details about how we do this |
2019-11-22 20:54:40 |
| 36.4.84.170 | attack | badbot |
2019-11-22 20:52:14 |
| 37.187.12.126 | attackbotsspam | 2019-11-22 10:00:11,867 fail2ban.actions: WARNING [ssh] Ban 37.187.12.126 |
2019-11-22 20:47:49 |
| 117.157.104.44 | attackspam | FTP Brute Force |
2019-11-22 20:16:30 |
| 117.67.64.159 | attackbotsspam | badbot |
2019-11-22 20:23:59 |
| 45.136.108.65 | attack | Microsoft Windows Terminal server RDP over non-standard port attempt |
2019-11-22 20:20:18 |
| 185.142.236.34 | attack | Fail2Ban Ban Triggered |
2019-11-22 20:48:02 |
| 178.62.214.85 | attack | Nov 22 13:52:06 areeb-Workstation sshd[8134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.214.85 Nov 22 13:52:08 areeb-Workstation sshd[8134]: Failed password for invalid user chatchai from 178.62.214.85 port 43103 ssh2 ... |
2019-11-22 20:17:28 |
| 88.250.15.252 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-22 20:31:22 |
| 113.100.86.98 | attackbots | badbot |
2019-11-22 20:45:38 |
| 134.119.179.255 | attackbotsspam | *Port Scan* detected from 134.119.179.255 (FR/France/-). 11 hits in the last 295 seconds |
2019-11-22 20:33:12 |
| 122.228.89.95 | attackbotsspam | Nov 22 10:16:14 ns41 sshd[17966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.228.89.95 Nov 22 10:16:14 ns41 sshd[17966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.228.89.95 |
2019-11-22 20:27:24 |
| 95.172.68.62 | attackbots | TCP Port Scanning |
2019-11-22 20:23:09 |