City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.60.211.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.60.211.18. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:26:56 CST 2025
;; MSG SIZE rcvd: 105
18.211.60.94.in-addr.arpa domain name pointer 18.211.60.94.rev.vodafone.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
18.211.60.94.in-addr.arpa name = 18.211.60.94.rev.vodafone.pt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 125.160.66.218 | attackbots | May 21 20:25:09 IngegnereFirenze sshd[21542]: Did not receive identification string from 125.160.66.218 port 19663 ... |
2020-05-22 08:00:17 |
| 144.217.13.40 | attackspambots | May 22 00:32:34 sso sshd[26035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.13.40 May 22 00:32:36 sso sshd[26035]: Failed password for invalid user da from 144.217.13.40 port 43822 ssh2 ... |
2020-05-22 07:34:45 |
| 165.22.112.45 | attack | Invalid user mfc from 165.22.112.45 port 39572 |
2020-05-22 07:38:03 |
| 206.189.145.251 | attackspam | Invalid user huyiyang from 206.189.145.251 port 46044 |
2020-05-22 07:53:39 |
| 184.168.152.100 | attack | 21.05.2020 22:25:09 - Wordpress fail Detected by ELinOX-ALM |
2020-05-22 08:12:30 |
| 128.199.72.32 | attackspam | Connection by 128.199.72.32 on port: 80 got caught by honeypot at 5/21/2020 9:25:27 PM |
2020-05-22 07:37:00 |
| 178.234.37.197 | attackbots | 365. On May 21 2020 experienced a Brute Force SSH login attempt -> 44 unique times by 178.234.37.197. |
2020-05-22 07:39:54 |
| 138.197.196.208 | attackspambots | odoo8 ... |
2020-05-22 08:15:58 |
| 179.27.71.18 | attackspam | SSH Invalid Login |
2020-05-22 08:15:25 |
| 159.89.199.229 | attack | Fail2Ban Ban Triggered (2) |
2020-05-22 07:40:26 |
| 192.126.157.11 | attack | (From simmonds.ezequiel75@gmail.com) Howdy NEW Hydravid PRO is the next generation software program for fast video creation and syndication. What’s more, creating videos has never been easier than the drag and drop interface within this software. You can easily syndicate out to multiple accounts on the biggest video platforms in the world, with just one click or schedule them live on Facebook or YouTube. MORE INFO HERE=> https://bit.ly/2zANiTL |
2020-05-22 07:37:17 |
| 167.71.228.227 | attackspambots | 2020-05-22T01:11:49.277242vps751288.ovh.net sshd\[7603\]: Invalid user xvi from 167.71.228.227 port 52328 2020-05-22T01:11:49.285925vps751288.ovh.net sshd\[7603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.228.227 2020-05-22T01:11:51.602697vps751288.ovh.net sshd\[7603\]: Failed password for invalid user xvi from 167.71.228.227 port 52328 ssh2 2020-05-22T01:21:23.005513vps751288.ovh.net sshd\[7705\]: Invalid user gwd from 167.71.228.227 port 37998 2020-05-22T01:21:23.016702vps751288.ovh.net sshd\[7705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.228.227 |
2020-05-22 07:51:26 |
| 95.181.131.153 | attack | May 21 19:31:25 firewall sshd[25724]: Invalid user spt from 95.181.131.153 May 21 19:31:27 firewall sshd[25724]: Failed password for invalid user spt from 95.181.131.153 port 43912 ssh2 May 21 19:35:04 firewall sshd[25831]: Invalid user xfp from 95.181.131.153 ... |
2020-05-22 08:05:49 |
| 194.61.24.177 | attack | May 22 01:20:30 datenbank sshd[43210]: Invalid user 0 from 194.61.24.177 port 13847 May 22 01:20:32 datenbank sshd[43210]: Failed password for invalid user 0 from 194.61.24.177 port 13847 ssh2 May 22 01:20:34 datenbank sshd[43210]: Disconnecting invalid user 0 194.61.24.177 port 13847: Change of username or service not allowed: (0,ssh-connection) -> (22,ssh-connection) [preauth] ... |
2020-05-22 07:44:56 |
| 43.226.236.222 | attackbotsspam | May 21 22:26:27 cdc sshd[30763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.236.222 May 21 22:26:28 cdc sshd[30763]: Failed password for invalid user vnz from 43.226.236.222 port 57970 ssh2 |
2020-05-22 07:31:00 |