City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.185.137.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.185.137.11. IN A
;; AUTHORITY SECTION:
. 165 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:58:54 CST 2023
;; MSG SIZE rcvd: 107
11.137.185.105.in-addr.arpa domain name pointer 105-185-137-11.telkomsa.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
11.137.185.105.in-addr.arpa name = 105-185-137-11.telkomsa.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
157.245.98.160 | attack | Aug 19 17:00:09 vps46666688 sshd[17665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.98.160 Aug 19 17:00:10 vps46666688 sshd[17665]: Failed password for invalid user lucia from 157.245.98.160 port 33486 ssh2 ... |
2020-08-20 04:20:35 |
5.188.84.95 | attackspam | 0,17-02/04 [bc01/m16] PostRequest-Spammer scoring: zurich |
2020-08-20 04:30:08 |
218.92.0.138 | attack | Aug 19 21:58:07 srv-ubuntu-dev3 sshd[85557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root Aug 19 21:58:09 srv-ubuntu-dev3 sshd[85557]: Failed password for root from 218.92.0.138 port 42975 ssh2 Aug 19 21:58:13 srv-ubuntu-dev3 sshd[85557]: Failed password for root from 218.92.0.138 port 42975 ssh2 Aug 19 21:58:07 srv-ubuntu-dev3 sshd[85557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root Aug 19 21:58:09 srv-ubuntu-dev3 sshd[85557]: Failed password for root from 218.92.0.138 port 42975 ssh2 Aug 19 21:58:13 srv-ubuntu-dev3 sshd[85557]: Failed password for root from 218.92.0.138 port 42975 ssh2 Aug 19 21:58:07 srv-ubuntu-dev3 sshd[85557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root Aug 19 21:58:09 srv-ubuntu-dev3 sshd[85557]: Failed password for root from 218.92.0.138 port 42975 ssh2 Aug 19 21 ... |
2020-08-20 04:15:33 |
207.46.13.96 | attack | Automatic report - Banned IP Access |
2020-08-20 04:31:59 |
14.163.32.28 | attackbots | Port Scan detected! ... |
2020-08-20 04:23:25 |
46.229.168.139 | attackbots | CF RAY ID: 5c543495e8d773d1 IP Class: searchEngine URI: /robots.txt |
2020-08-20 04:30:38 |
211.219.18.186 | attackbots | Aug 19 21:30:51 ip40 sshd[31058]: Failed password for root from 211.219.18.186 port 32774 ssh2 ... |
2020-08-20 04:23:56 |
49.235.156.47 | attackbotsspam | Aug 19 22:06:45 kh-dev-server sshd[6069]: Failed password for root from 49.235.156.47 port 46236 ssh2 ... |
2020-08-20 04:37:24 |
213.141.131.22 | attackspam | Aug 19 20:32:07 rotator sshd\[23318\]: Address 213.141.131.22 maps to pri.msk.ru, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 19 20:32:07 rotator sshd\[23318\]: Invalid user jo from 213.141.131.22Aug 19 20:32:09 rotator sshd\[23318\]: Failed password for invalid user jo from 213.141.131.22 port 51494 ssh2Aug 19 20:35:44 rotator sshd\[24086\]: Address 213.141.131.22 maps to pri.msk.ru, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Aug 19 20:35:44 rotator sshd\[24086\]: Invalid user hp from 213.141.131.22Aug 19 20:35:46 rotator sshd\[24086\]: Failed password for invalid user hp from 213.141.131.22 port 59040 ssh2 ... |
2020-08-20 03:58:48 |
112.85.42.87 | attackspam | 2020-08-19T20:26:45.185514shield sshd\[14718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root 2020-08-19T20:26:47.558863shield sshd\[14718\]: Failed password for root from 112.85.42.87 port 31337 ssh2 2020-08-19T20:26:49.808249shield sshd\[14718\]: Failed password for root from 112.85.42.87 port 31337 ssh2 2020-08-19T20:26:51.803244shield sshd\[14718\]: Failed password for root from 112.85.42.87 port 31337 ssh2 2020-08-19T20:27:48.923931shield sshd\[14783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root |
2020-08-20 04:33:42 |
192.35.169.28 | attackbotsspam |
|
2020-08-20 04:18:36 |
104.131.12.184 | attackbots | Aug 19 02:33:53 main sshd[32668]: Failed password for invalid user rich from 104.131.12.184 port 53102 ssh2 |
2020-08-20 04:15:15 |
106.54.219.237 | attack | Invalid user logstash from 106.54.219.237 port 51587 |
2020-08-20 04:02:43 |
157.100.33.91 | attackspam | 2020-08-20T00:58:08.930239hostname sshd[13249]: Invalid user terrariaserver from 157.100.33.91 port 47664 2020-08-20T00:58:11.177565hostname sshd[13249]: Failed password for invalid user terrariaserver from 157.100.33.91 port 47664 ssh2 2020-08-20T01:01:35.371872hostname sshd[14958]: Invalid user dev from 157.100.33.91 port 58890 ... |
2020-08-20 04:37:02 |
95.181.131.153 | attackspambots | Aug 19 21:50:45 ns381471 sshd[24233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153 Aug 19 21:50:47 ns381471 sshd[24233]: Failed password for invalid user www from 95.181.131.153 port 51768 ssh2 |
2020-08-20 04:05:13 |