City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: Vodafone
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.63.55.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7457
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.63.55.149. IN A
;; AUTHORITY SECTION:
. 410 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023052800 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 28 14:17:15 CST 2023
;; MSG SIZE rcvd: 105
149.55.63.94.in-addr.arpa domain name pointer 149.55.63.94.rev.vodafone.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.55.63.94.in-addr.arpa name = 149.55.63.94.rev.vodafone.pt.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
92.118.161.29 | attack | port scan and connect, tcp 143 (imap) |
2019-10-04 03:58:00 |
203.192.231.218 | attackbots | Oct 3 21:15:04 pkdns2 sshd\[57178\]: Invalid user dujoey from 203.192.231.218Oct 3 21:15:06 pkdns2 sshd\[57178\]: Failed password for invalid user dujoey from 203.192.231.218 port 37726 ssh2Oct 3 21:19:08 pkdns2 sshd\[57383\]: Invalid user webmaster from 203.192.231.218Oct 3 21:19:10 pkdns2 sshd\[57383\]: Failed password for invalid user webmaster from 203.192.231.218 port 14553 ssh2Oct 3 21:23:10 pkdns2 sshd\[57576\]: Invalid user ip from 203.192.231.218Oct 3 21:23:11 pkdns2 sshd\[57576\]: Failed password for invalid user ip from 203.192.231.218 port 55363 ssh2 ... |
2019-10-04 03:58:50 |
5.199.130.188 | attackbots | 2019-10-03T19:10:37.790450abusebot.cloudsearch.cf sshd\[18066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor.piratenpartei-nrw.de user=root |
2019-10-04 03:51:58 |
23.94.16.72 | attack | Automated report - ssh fail2ban: Oct 3 19:55:13 authentication failure Oct 3 19:55:14 wrong password, user=andy, port=53304, ssh2 Oct 3 19:59:33 authentication failure |
2019-10-04 03:53:32 |
202.108.31.160 | attackspam | Sep 30 10:32:26 mail sshd[9232]: Invalid user o2 from 202.108.31.160 Sep 30 10:32:28 mail sshd[9232]: Failed password for invalid user o2 from 202.108.31.160 port 38170 ssh2 Sep 30 10:58:40 mail sshd[9781]: Failed password for r.r from 202.108.31.160 port 51002 ssh2 Sep 30 11:02:48 mail sshd[9839]: Invalid user bookkeeper from 202.108.31.160 Sep 30 11:02:50 mail sshd[9839]: Failed password for invalid user bookkeeper from 202.108.31.160 port 52338 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=202.108.31.160 |
2019-10-04 04:02:53 |
89.248.174.215 | attack | 10/03/2019-15:26:46.354039 89.248.174.215 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98 |
2019-10-04 03:48:43 |
188.243.66.208 | attackbotsspam | Automated report - ssh fail2ban: Oct 3 15:26:21 authentication failure Oct 3 15:26:22 wrong password, user=agnes, port=40238, ssh2 Oct 3 15:30:40 authentication failure |
2019-10-04 03:41:21 |
92.118.161.17 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-04 04:05:40 |
139.217.216.202 | attackbots | $f2bV_matches |
2019-10-04 03:42:52 |
223.255.10.6 | attack | Sep 30 02:05:05 extapp sshd[4033]: Invalid user pi from 223.255.10.6 Sep 30 02:05:07 extapp sshd[4033]: Failed password for invalid user pi from 223.255.10.6 port 45110 ssh2 Sep 30 02:05:07 extapp sshd[4045]: Invalid user pi from 223.255.10.6 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=223.255.10.6 |
2019-10-04 03:55:54 |
113.128.199.196 | attack | Automated reporting of SSH Vulnerability scanning |
2019-10-04 03:41:38 |
70.125.42.101 | attackbotsspam | Oct 2 18:28:12 majoron sshd[31887]: Invalid user roby from 70.125.42.101 port 33244 Oct 2 18:28:12 majoron sshd[31887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.125.42.101 Oct 2 18:28:14 majoron sshd[31887]: Failed password for invalid user roby from 70.125.42.101 port 33244 ssh2 Oct 2 18:28:15 majoron sshd[31887]: Received disconnect from 70.125.42.101 port 33244:11: Bye Bye [preauth] Oct 2 18:28:15 majoron sshd[31887]: Disconnected from 70.125.42.101 port 33244 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=70.125.42.101 |
2019-10-04 04:20:01 |
222.124.16.227 | attackspam | Oct 2 05:29:54 ns341937 sshd[2754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227 Oct 2 05:29:56 ns341937 sshd[2754]: Failed password for invalid user tereluz from 222.124.16.227 port 45594 ssh2 Oct 2 05:53:08 ns341937 sshd[9813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227 ... |
2019-10-04 04:00:23 |
92.118.161.49 | attack | 5984/tcp 5985/tcp 17185/udp... [2019-08-02/10-02]49pkt,35pt.(tcp),1pt.(udp),1tp.(icmp) |
2019-10-04 03:46:08 |
65.151.157.14 | attack | 2019-10-03 09:01:01,909 fail2ban.actions [843]: NOTICE [sshd] Ban 65.151.157.14 2019-10-03 12:10:26,798 fail2ban.actions [843]: NOTICE [sshd] Ban 65.151.157.14 2019-10-03 15:30:31,861 fail2ban.actions [843]: NOTICE [sshd] Ban 65.151.157.14 ... |
2019-10-04 03:46:36 |