City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: Cell C
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.12.145.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36304
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.12.145.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121902 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 06:41:40 CST 2025
;; MSG SIZE rcvd: 107
Host 104.145.12.105.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.145.12.105.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 145.239.88.43 | attackspam | Sep 3 06:43:46 meumeu sshd[31920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.88.43 Sep 3 06:43:48 meumeu sshd[31920]: Failed password for invalid user yong from 145.239.88.43 port 54290 ssh2 Sep 3 06:47:47 meumeu sshd[32382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.88.43 ... |
2019-09-03 14:17:35 |
| 107.170.63.221 | attackbotsspam | Sep 2 20:15:05 wbs sshd\[18758\]: Invalid user ftphome from 107.170.63.221 Sep 2 20:15:05 wbs sshd\[18758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.63.221 Sep 2 20:15:07 wbs sshd\[18758\]: Failed password for invalid user ftphome from 107.170.63.221 port 42276 ssh2 Sep 2 20:19:02 wbs sshd\[19137\]: Invalid user ftpuser from 107.170.63.221 Sep 2 20:19:02 wbs sshd\[19137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.63.221 |
2019-09-03 14:22:13 |
| 218.107.154.74 | attack | Sep 2 17:16:23 web1 sshd\[17697\]: Invalid user uu from 218.107.154.74 Sep 2 17:16:23 web1 sshd\[17697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.107.154.74 Sep 2 17:16:25 web1 sshd\[17697\]: Failed password for invalid user uu from 218.107.154.74 port 10459 ssh2 Sep 2 17:19:30 web1 sshd\[17987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.107.154.74 user=root Sep 2 17:19:32 web1 sshd\[17987\]: Failed password for root from 218.107.154.74 port 24235 ssh2 |
2019-09-03 13:57:04 |
| 210.105.240.202 | attackspambots | Mail sent to address harvested from public web site |
2019-09-03 14:02:49 |
| 113.237.236.9 | attackbotsspam | Unauthorised access (Sep 3) SRC=113.237.236.9 LEN=40 TTL=49 ID=36471 TCP DPT=8080 WINDOW=10667 SYN Unauthorised access (Sep 2) SRC=113.237.236.9 LEN=40 TTL=49 ID=59632 TCP DPT=8080 WINDOW=10667 SYN |
2019-09-03 13:56:28 |
| 58.210.96.156 | attackspam | Sep 3 01:50:31 markkoudstaal sshd[16658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.96.156 Sep 3 01:50:33 markkoudstaal sshd[16658]: Failed password for invalid user kathleen from 58.210.96.156 port 35218 ssh2 Sep 3 01:55:08 markkoudstaal sshd[17084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.96.156 |
2019-09-03 14:02:05 |
| 142.93.187.61 | attackspam | Sep 3 07:02:27 www1 sshd\[43638\]: Invalid user 123 from 142.93.187.61Sep 3 07:02:30 www1 sshd\[43638\]: Failed password for invalid user 123 from 142.93.187.61 port 43150 ssh2Sep 3 07:06:03 www1 sshd\[44151\]: Invalid user fuckyou from 142.93.187.61Sep 3 07:06:05 www1 sshd\[44151\]: Failed password for invalid user fuckyou from 142.93.187.61 port 59322 ssh2Sep 3 07:09:43 www1 sshd\[44418\]: Invalid user password123 from 142.93.187.61Sep 3 07:09:45 www1 sshd\[44418\]: Failed password for invalid user password123 from 142.93.187.61 port 47236 ssh2 ... |
2019-09-03 14:05:38 |
| 119.47.92.20 | attackspam | Unauthorized connection attempt from IP address 119.47.92.20 on Port 445(SMB) |
2019-09-03 14:34:10 |
| 223.255.10.6 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2019-09-03 14:32:30 |
| 41.138.88.3 | attackspambots | *Port Scan* detected from 41.138.88.3 (BJ/Benin/3mob.moov.bj). 4 hits in the last 65 seconds |
2019-09-03 14:29:48 |
| 46.148.187.9 | attackbotsspam | Port 1433 Scan |
2019-09-03 13:55:44 |
| 159.192.99.3 | attackspambots | $f2bV_matches |
2019-09-03 14:19:54 |
| 125.212.254.116 | attackspam | Unauthorized connection attempt from IP address 125.212.254.116 on Port 445(SMB) |
2019-09-03 14:08:35 |
| 117.187.12.126 | attackspam | 2019-09-03T00:38:27.897149abusebot.cloudsearch.cf sshd\[30644\]: Invalid user tty from 117.187.12.126 port 42316 |
2019-09-03 14:04:38 |
| 90.188.229.86 | attackbotsspam | Unauthorized connection attempt from IP address 90.188.229.86 on Port 445(SMB) |
2019-09-03 14:33:11 |