City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: Vodafone
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.60.30.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.60.30.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:17:51 CST 2025
;; MSG SIZE rcvd: 105
124.30.60.94.in-addr.arpa domain name pointer 124.30.60.94.rev.vodafone.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
124.30.60.94.in-addr.arpa name = 124.30.60.94.rev.vodafone.pt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.135.185.230 | attackbotsspam | Aug 23 15:32:49 vpn01 sshd[3505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.185.230 Aug 23 15:32:50 vpn01 sshd[3505]: Failed password for invalid user katrina from 5.135.185.230 port 43492 ssh2 ... |
2020-08-23 23:01:26 |
| 222.255.115.237 | attackbotsspam | Aug 23 13:37:19 onepixel sshd[3080829]: Invalid user mc1 from 222.255.115.237 port 38840 Aug 23 13:37:19 onepixel sshd[3080829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.255.115.237 Aug 23 13:37:19 onepixel sshd[3080829]: Invalid user mc1 from 222.255.115.237 port 38840 Aug 23 13:37:20 onepixel sshd[3080829]: Failed password for invalid user mc1 from 222.255.115.237 port 38840 ssh2 Aug 23 13:41:44 onepixel sshd[3081719]: Invalid user moon from 222.255.115.237 port 45242 |
2020-08-23 21:46:45 |
| 152.231.93.130 | attackbots | Aug 23 13:33:29 124388 sshd[1532]: Invalid user odoo11 from 152.231.93.130 port 4938 Aug 23 13:33:30 124388 sshd[1532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.93.130 Aug 23 13:33:29 124388 sshd[1532]: Invalid user odoo11 from 152.231.93.130 port 4938 Aug 23 13:33:32 124388 sshd[1532]: Failed password for invalid user odoo11 from 152.231.93.130 port 4938 ssh2 Aug 23 13:36:00 124388 sshd[1633]: Invalid user sharon from 152.231.93.130 port 47800 |
2020-08-23 21:50:41 |
| 219.135.209.164 | attackspambots | 2020-08-23T19:17:54.730667hostname sshd[107547]: Invalid user ahmed from 219.135.209.164 port 34775 2020-08-23T19:17:55.999715hostname sshd[107547]: Failed password for invalid user ahmed from 219.135.209.164 port 34775 ssh2 2020-08-23T19:27:36.206845hostname sshd[108738]: Invalid user google from 219.135.209.164 port 25457 ... |
2020-08-23 22:51:11 |
| 45.119.82.251 | attack | Aug 23 14:16:53 serwer sshd\[17659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.82.251 user=root Aug 23 14:16:55 serwer sshd\[17659\]: Failed password for root from 45.119.82.251 port 48712 ssh2 Aug 23 14:23:07 serwer sshd\[18393\]: Invalid user cib from 45.119.82.251 port 44056 Aug 23 14:23:07 serwer sshd\[18393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.82.251 ... |
2020-08-23 22:47:06 |
| 106.53.2.176 | attackbots | SSH brute-force attempt |
2020-08-23 21:46:25 |
| 121.183.203.60 | attackbotsspam | Aug 23 20:35:15 webhost01 sshd[2135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.183.203.60 Aug 23 20:35:17 webhost01 sshd[2135]: Failed password for invalid user jules from 121.183.203.60 port 44976 ssh2 ... |
2020-08-23 22:00:10 |
| 182.61.35.17 | attackspambots | Aug 23 14:22:53 * sshd[28202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.35.17 Aug 23 14:22:55 * sshd[28202]: Failed password for invalid user alex from 182.61.35.17 port 53238 ssh2 |
2020-08-23 23:03:34 |
| 120.203.160.18 | attackspambots | 2020-08-23T15:21:53.201263lavrinenko.info sshd[6162]: Invalid user rr from 120.203.160.18 port 56972 2020-08-23T15:21:53.212904lavrinenko.info sshd[6162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.203.160.18 2020-08-23T15:21:53.201263lavrinenko.info sshd[6162]: Invalid user rr from 120.203.160.18 port 56972 2020-08-23T15:21:55.286599lavrinenko.info sshd[6162]: Failed password for invalid user rr from 120.203.160.18 port 56972 ssh2 2020-08-23T15:24:14.268223lavrinenko.info sshd[6277]: Invalid user user from 120.203.160.18 port 29566 ... |
2020-08-23 21:49:51 |
| 105.186.148.192 | attackspambots | Unauthorized connection attempt from IP address 105.186.148.192 on Port 445(SMB) |
2020-08-23 22:00:39 |
| 65.191.76.227 | attackbotsspam | Automatic report BANNED IP |
2020-08-23 22:50:24 |
| 217.182.67.242 | attackspambots | Aug 23 12:22:59 ws26vmsma01 sshd[139041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.67.242 Aug 23 12:23:01 ws26vmsma01 sshd[139041]: Failed password for invalid user octopus from 217.182.67.242 port 43874 ssh2 ... |
2020-08-23 22:53:21 |
| 164.90.214.5 | attackspam | SSH |
2020-08-23 22:43:50 |
| 216.218.206.123 | attackspambots | Unwanted checking 80 or 443 port ... |
2020-08-23 21:53:36 |
| 81.68.127.249 | attack | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-08-23 21:51:04 |