City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.68.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.213.68.91. IN A
;; AUTHORITY SECTION:
. 127 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:52:26 CST 2022
;; MSG SIZE rcvd: 106
91.68.213.105.in-addr.arpa domain name pointer 105-213-68-91.access.mtnbusiness.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
91.68.213.105.in-addr.arpa name = 105-213-68-91.access.mtnbusiness.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
202.57.45.50 | attack | Unauthorized connection attempt from IP address 202.57.45.50 on Port 445(SMB) |
2019-10-16 13:08:54 |
217.182.74.125 | attack | Oct 16 00:53:32 TORMINT sshd\[3799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.74.125 user=root Oct 16 00:53:34 TORMINT sshd\[3799\]: Failed password for root from 217.182.74.125 port 50600 ssh2 Oct 16 00:57:52 TORMINT sshd\[4124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.74.125 user=root ... |
2019-10-16 12:59:31 |
191.96.25.105 | attackbotsspam | Oct 16 10:57:07 lcl-usvr-02 sshd[6855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.25.105 user=root Oct 16 10:57:09 lcl-usvr-02 sshd[6855]: Failed password for root from 191.96.25.105 port 51902 ssh2 Oct 16 11:01:19 lcl-usvr-02 sshd[7920]: Invalid user zun from 191.96.25.105 port 34128 Oct 16 11:01:19 lcl-usvr-02 sshd[7920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.25.105 Oct 16 11:01:19 lcl-usvr-02 sshd[7920]: Invalid user zun from 191.96.25.105 port 34128 Oct 16 11:01:21 lcl-usvr-02 sshd[7920]: Failed password for invalid user zun from 191.96.25.105 port 34128 ssh2 ... |
2019-10-16 13:06:32 |
193.56.28.78 | attack | Honeypot hit. |
2019-10-16 13:07:50 |
14.174.101.209 | attackbots | Unauthorized connection attempt from IP address 14.174.101.209 on Port 445(SMB) |
2019-10-16 13:00:52 |
119.206.67.143 | attack | Oct 16 08:30:49 gw1 sshd[24650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.206.67.143 Oct 16 08:30:51 gw1 sshd[24650]: Failed password for invalid user admin from 119.206.67.143 port 39637 ssh2 ... |
2019-10-16 12:55:03 |
61.153.247.166 | attackbots | Unauthorized connection attempt from IP address 61.153.247.166 on Port 445(SMB) |
2019-10-16 13:20:28 |
149.56.100.237 | attackbotsspam | Oct 15 17:43:56 tdfoods sshd\[11922\]: Invalid user wallet from 149.56.100.237 Oct 15 17:43:56 tdfoods sshd\[11922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=237.ip-149-56-100.net Oct 15 17:43:58 tdfoods sshd\[11922\]: Failed password for invalid user wallet from 149.56.100.237 port 38420 ssh2 Oct 15 17:47:53 tdfoods sshd\[12276\]: Invalid user charity from 149.56.100.237 Oct 15 17:47:53 tdfoods sshd\[12276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=237.ip-149-56-100.net |
2019-10-16 13:02:34 |
120.52.152.16 | attack | ET DROP Dshield Block Listed Source group 1 - port: 2379 proto: TCP cat: Misc Attack |
2019-10-16 13:16:00 |
210.221.220.68 | attackbots | Oct 16 06:32:19 root sshd[9931]: Failed password for root from 210.221.220.68 port 36704 ssh2 Oct 16 06:36:44 root sshd[9966]: Failed password for root from 210.221.220.68 port 39216 ssh2 ... |
2019-10-16 13:21:26 |
118.25.84.184 | attackbots | Oct 15 15:37:25 hurricane sshd[21366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.84.184 user=r.r Oct 15 15:37:27 hurricane sshd[21366]: Failed password for r.r from 118.25.84.184 port 56040 ssh2 Oct 15 15:37:27 hurricane sshd[21366]: Received disconnect from 118.25.84.184 port 56040:11: Bye Bye [preauth] Oct 15 15:37:27 hurricane sshd[21366]: Disconnected from 118.25.84.184 port 56040 [preauth] Oct 15 15:42:15 hurricane sshd[21376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.84.184 user=r.r Oct 15 15:42:17 hurricane sshd[21376]: Failed password for r.r from 118.25.84.184 port 39496 ssh2 Oct 15 15:42:17 hurricane sshd[21376]: Received disconnect from 118.25.84.184 port 39496:11: Bye Bye [preauth] Oct 15 15:42:17 hurricane sshd[21376]: Disconnected from 118.25.84.184 port 39496 [preauth] Oct 15 15:46:33 hurricane sshd[21388]: pam_unix(sshd:auth): authentication failu........ ------------------------------- |
2019-10-16 13:23:27 |
112.64.32.118 | attackbotsspam | Oct 16 07:57:44 server sshd\[18071\]: Invalid user bret from 112.64.32.118 Oct 16 07:57:44 server sshd\[18071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.32.118 Oct 16 07:57:46 server sshd\[18071\]: Failed password for invalid user bret from 112.64.32.118 port 45306 ssh2 Oct 16 08:16:39 server sshd\[24545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.32.118 user=root Oct 16 08:16:41 server sshd\[24545\]: Failed password for root from 112.64.32.118 port 35140 ssh2 ... |
2019-10-16 13:16:48 |
49.88.112.112 | attack | 2019-10-16T06:42:59.9138491240 sshd\[2451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112 user=root 2019-10-16T06:43:02.2389281240 sshd\[2451\]: Failed password for root from 49.88.112.112 port 26179 ssh2 2019-10-16T06:43:04.3229721240 sshd\[2451\]: Failed password for root from 49.88.112.112 port 26179 ssh2 ... |
2019-10-16 13:11:09 |
80.79.179.2 | attackbots | k+ssh-bruteforce |
2019-10-16 13:19:04 |
45.136.109.208 | attack | Unauthorized connection attempt from IP address 45.136.109.208 on Port 3389(RDP) |
2019-10-16 13:07:28 |