City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.246.63.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.246.63.132. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 20:04:53 CST 2025
;; MSG SIZE rcvd: 106
132.63.246.85.in-addr.arpa domain name pointer bl13-63-132.dsl.telepac.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
132.63.246.85.in-addr.arpa name = bl13-63-132.dsl.telepac.pt.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
39.59.96.6 | attackbots | IP 39.59.96.6 attacked honeypot on port: 8080 at 6/8/2020 4:50:05 AM |
2020-06-08 16:04:58 |
104.236.38.182 | attackspambots | 2020-06-08T00:42:45.081300suse-nuc sshd[18223]: User root from 104.236.38.182 not allowed because listed in DenyUsers ... |
2020-06-08 16:18:55 |
101.89.135.53 | attackspambots | Jun 8 07:16:04 vps647732 sshd[21295]: Failed password for root from 101.89.135.53 port 50387 ssh2 ... |
2020-06-08 16:31:50 |
180.153.65.18 | attackbots | Jun 8 08:14:32 ourumov-web sshd\[24401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.153.65.18 user=root Jun 8 08:14:34 ourumov-web sshd\[24401\]: Failed password for root from 180.153.65.18 port 53464 ssh2 Jun 8 08:27:08 ourumov-web sshd\[25219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.153.65.18 user=root ... |
2020-06-08 16:21:22 |
116.212.152.237 | attack | 20/6/7@23:50:03: FAIL: Alarm-Network address from=116.212.152.237 20/6/7@23:50:03: FAIL: Alarm-Network address from=116.212.152.237 ... |
2020-06-08 16:21:50 |
49.235.23.20 | attackbotsspam | Jun 8 06:58:58 vps687878 sshd\[25832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.23.20 user=root Jun 8 06:59:00 vps687878 sshd\[25832\]: Failed password for root from 49.235.23.20 port 45321 ssh2 Jun 8 07:05:00 vps687878 sshd\[26443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.23.20 user=root Jun 8 07:05:02 vps687878 sshd\[26443\]: Failed password for root from 49.235.23.20 port 50824 ssh2 Jun 8 07:07:59 vps687878 sshd\[26859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.23.20 user=root ... |
2020-06-08 16:26:38 |
97.84.225.94 | attackbots | 2020-06-08T05:40:11.554860shield sshd\[9368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=097-084-225-094.res.spectrum.com user=root 2020-06-08T05:40:13.831297shield sshd\[9368\]: Failed password for root from 97.84.225.94 port 54900 ssh2 2020-06-08T05:44:10.386359shield sshd\[10218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=097-084-225-094.res.spectrum.com user=root 2020-06-08T05:44:12.803734shield sshd\[10218\]: Failed password for root from 97.84.225.94 port 54172 ssh2 2020-06-08T05:47:58.706968shield sshd\[11227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=097-084-225-094.res.spectrum.com user=root |
2020-06-08 16:25:32 |
161.35.69.78 | attackbots | Fortinet FortiOS SSL VPN Path Traversal Vulnerability |
2020-06-08 16:00:51 |
114.161.127.168 | attack | 404 NOT FOUND |
2020-06-08 16:15:13 |
99.11.1.97 | attackbots | Jun 8 08:34:46 nas sshd[16571]: Failed password for root from 99.11.1.97 port 53772 ssh2 Jun 8 08:45:16 nas sshd[17008]: Failed password for root from 99.11.1.97 port 43920 ssh2 ... |
2020-06-08 16:19:29 |
122.114.239.22 | attackspambots | Lines containing failures of 122.114.239.22 Jun 7 23:51:25 shared07 sshd[12240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.239.22 user=r.r Jun 7 23:51:28 shared07 sshd[12240]: Failed password for r.r from 122.114.239.22 port 40466 ssh2 Jun 7 23:51:28 shared07 sshd[12240]: Received disconnect from 122.114.239.22 port 40466:11: Bye Bye [preauth] Jun 7 23:51:28 shared07 sshd[12240]: Disconnected from authenticating user r.r 122.114.239.22 port 40466 [preauth] Jun 8 00:13:11 shared07 sshd[22868]: Connection closed by 122.114.239.22 port 53006 [preauth] Jun 8 00:16:52 shared07 sshd[24198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.239.22 user=r.r Jun 8 00:16:54 shared07 sshd[24198]: Failed password for r.r from 122.114.239.22 port 41142 ssh2 Jun 8 00:16:54 shared07 sshd[24198]: Received disconnect from 122.114.239.22 port 41142:11: Bye Bye [preauth] Jun 8 00:........ ------------------------------ |
2020-06-08 16:39:17 |
122.51.2.33 | attackspam | Jun 8 10:03:02 lnxded63 sshd[15969]: Failed password for root from 122.51.2.33 port 35684 ssh2 Jun 8 10:07:58 lnxded63 sshd[16312]: Failed password for root from 122.51.2.33 port 58048 ssh2 |
2020-06-08 16:13:37 |
49.235.240.141 | attack | 2020-06-07 23:04:12.731310-0500 localhost sshd[26635]: Failed password for root from 49.235.240.141 port 42110 ssh2 |
2020-06-08 16:14:09 |
36.90.223.205 | attackbots | (sshd) Failed SSH login from 36.90.223.205 (ID/Indonesia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 8 05:37:53 antmedia sshd[24785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.90.223.205 user=root Jun 8 05:37:55 antmedia sshd[24785]: Failed password for root from 36.90.223.205 port 37486 ssh2 Jun 8 05:45:35 antmedia sshd[24838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.90.223.205 user=root Jun 8 05:45:37 antmedia sshd[24838]: Failed password for root from 36.90.223.205 port 39046 ssh2 Jun 8 05:50:02 antmedia sshd[24862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.90.223.205 user=root |
2020-06-08 16:13:15 |
186.75.17.205 | attackspam | 400 BAD REQUEST |
2020-06-08 16:08:04 |