City: Johannesburg
Region: Gauteng
Country: South Africa
Internet Service Provider: MTN
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.90.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.213.90.13. IN A
;; AUTHORITY SECTION:
. 297 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022032701 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 28 10:29:49 CST 2022
;; MSG SIZE rcvd: 106
13.90.213.105.in-addr.arpa domain name pointer 105-213-90-13.access.mtnbusiness.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
13.90.213.105.in-addr.arpa name = 105-213-90-13.access.mtnbusiness.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
167.172.227.82 | attack | Trolling for resource vulnerabilities |
2020-10-13 07:21:41 |
167.99.51.159 | attackbots | 2020-10-12T22:47:42.332929cyberdyne sshd[731688]: Invalid user moisei from 167.99.51.159 port 56642 2020-10-12T22:47:42.338861cyberdyne sshd[731688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.51.159 2020-10-12T22:47:42.332929cyberdyne sshd[731688]: Invalid user moisei from 167.99.51.159 port 56642 2020-10-12T22:47:44.563969cyberdyne sshd[731688]: Failed password for invalid user moisei from 167.99.51.159 port 56642 ssh2 ... |
2020-10-13 07:28:26 |
95.182.122.131 | attackbots | Invalid user ej from 95.182.122.131 port 41649 |
2020-10-13 07:15:50 |
162.208.51.46 | attack | 162.208.51.46 - - [13/Oct/2020:01:01:24 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 162.208.51.46 - - [13/Oct/2020:01:06:17 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-13 07:31:33 |
211.170.28.252 | attackspam | Oct 12 23:08:45 rush sshd[11018]: Failed password for root from 211.170.28.252 port 41776 ssh2 Oct 12 23:11:34 rush sshd[11105]: Failed password for root from 211.170.28.252 port 55634 ssh2 Oct 12 23:14:24 rush sshd[11166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.170.28.252 ... |
2020-10-13 07:40:48 |
5.39.95.38 | attackspam | 2020-10-13T01:02:33.677724lavrinenko.info sshd[20627]: Failed password for invalid user reinhard from 5.39.95.38 port 57200 ssh2 2020-10-13T01:06:14.801305lavrinenko.info sshd[20748]: Invalid user wsmith from 5.39.95.38 port 39872 2020-10-13T01:06:14.807988lavrinenko.info sshd[20748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.95.38 2020-10-13T01:06:14.801305lavrinenko.info sshd[20748]: Invalid user wsmith from 5.39.95.38 port 39872 2020-10-13T01:06:16.573666lavrinenko.info sshd[20748]: Failed password for invalid user wsmith from 5.39.95.38 port 39872 ssh2 ... |
2020-10-13 07:46:13 |
212.70.149.68 | attackbotsspam | Oct 13 01:20:35 mx postfix/smtps/smtpd\[4703\]: lost connection after AUTH from unknown\[212.70.149.68\] Oct 13 01:22:23 mx postfix/smtps/smtpd\[4703\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 01:22:28 mx postfix/smtps/smtpd\[4703\]: lost connection after AUTH from unknown\[212.70.149.68\] Oct 13 01:24:15 mx postfix/smtps/smtpd\[4703\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 13 01:24:20 mx postfix/smtps/smtpd\[4703\]: lost connection after AUTH from unknown\[212.70.149.68\] ... |
2020-10-13 07:38:41 |
49.235.239.146 | attack | Oct 12 23:09:04 localhost sshd[31441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.239.146 user=root Oct 12 23:09:06 localhost sshd[31441]: Failed password for root from 49.235.239.146 port 59250 ssh2 Oct 12 23:13:41 localhost sshd[31890]: Invalid user ben from 49.235.239.146 port 57652 Oct 12 23:13:41 localhost sshd[31890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.239.146 Oct 12 23:13:41 localhost sshd[31890]: Invalid user ben from 49.235.239.146 port 57652 Oct 12 23:13:44 localhost sshd[31890]: Failed password for invalid user ben from 49.235.239.146 port 57652 ssh2 ... |
2020-10-13 07:22:46 |
111.231.63.42 | attackspam | Oct 12 23:48:13 *hidden* sshd[40871]: Failed password for invalid user engelbert from 111.231.63.42 port 51642 ssh2 Oct 12 23:52:44 *hidden* sshd[45496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.63.42 user=root Oct 12 23:52:46 *hidden* sshd[45496]: Failed password for *hidden* from 111.231.63.42 port 47824 ssh2 |
2020-10-13 07:40:10 |
49.234.45.241 | attack | Oct 12 14:32:22 mockhub sshd[1276266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.45.241 Oct 12 14:32:22 mockhub sshd[1276266]: Invalid user guest from 49.234.45.241 port 50108 Oct 12 14:32:24 mockhub sshd[1276266]: Failed password for invalid user guest from 49.234.45.241 port 50108 ssh2 ... |
2020-10-13 07:16:32 |
132.232.32.203 | attackspam | Bruteforce detected by fail2ban |
2020-10-13 07:38:56 |
134.73.5.54 | attackbotsspam | Oct 12 22:21:32 plex-server sshd[743819]: Invalid user za from 134.73.5.54 port 40072 Oct 12 22:21:32 plex-server sshd[743819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.5.54 Oct 12 22:21:32 plex-server sshd[743819]: Invalid user za from 134.73.5.54 port 40072 Oct 12 22:21:34 plex-server sshd[743819]: Failed password for invalid user za from 134.73.5.54 port 40072 ssh2 Oct 12 22:25:12 plex-server sshd[745582]: Invalid user gunnar from 134.73.5.54 port 33346 ... |
2020-10-13 07:17:31 |
217.182.233.242 | attackbotsspam | RDP Bruteforce |
2020-10-13 07:13:08 |
58.185.183.60 | attackspam | Oct 12 23:56:44 [host] sshd[26082]: Invalid user z Oct 12 23:56:44 [host] sshd[26082]: pam_unix(sshd: Oct 12 23:56:46 [host] sshd[26082]: Failed passwor |
2020-10-13 07:48:03 |
213.33.216.246 | attack | Invalid user alfredo from 213.33.216.246 port 32808 |
2020-10-13 07:15:23 |