City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.237.49.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34239
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.237.49.149. IN A
;; AUTHORITY SECTION:
. 567 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 08:47:27 CST 2023
;; MSG SIZE rcvd: 107
149.49.237.105.in-addr.arpa domain name pointer 105-237-49-149.access.mtnbusiness.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.49.237.105.in-addr.arpa name = 105-237-49-149.access.mtnbusiness.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
103.97.128.87 | attackspam | $f2bV_matches |
2020-03-11 20:17:15 |
212.133.243.104 | attackbots | Unauthorized connection attempt detected from IP address 212.133.243.104 to port 23 |
2020-03-11 20:41:57 |
106.12.46.183 | attack | Mar 11 08:52:58 h2570396 sshd[21328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.46.183 user=r.r Mar 11 08:52:59 h2570396 sshd[21328]: Failed password for r.r from 106.12.46.183 port 53182 ssh2 Mar 11 08:53:00 h2570396 sshd[21328]: Received disconnect from 106.12.46.183: 11: Bye Bye [preauth] Mar 11 09:03:09 h2570396 sshd[22666]: Failed password for invalid user rustserver from 106.12.46.183 port 56198 ssh2 Mar 11 09:03:09 h2570396 sshd[22666]: Received disconnect from 106.12.46.183: 11: Bye Bye [preauth] Mar 11 09:07:04 h2570396 sshd[22728]: Connection closed by 106.12.46.183 [preauth] Mar 11 09:10:33 h2570396 sshd[22819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.46.183 user=r.r Mar 11 09:10:35 h2570396 sshd[22819]: Failed password for r.r from 106.12.46.183 port 58696 ssh2 Mar 11 09:10:36 h2570396 sshd[22819]: Received disconnect from 106.12.46.183: 11: Bye Bye ........ ------------------------------- |
2020-03-11 20:45:13 |
111.230.209.21 | attack | $f2bV_matches |
2020-03-11 20:15:53 |
36.71.237.33 | attackspam | Automatic report - SSH Brute-Force Attack |
2020-03-11 20:27:13 |
113.162.247.221 | attackbotsspam | Attempted connection to port 1433. |
2020-03-11 20:28:54 |
51.38.186.47 | attack | SSH login attempts. |
2020-03-11 20:31:21 |
45.233.111.103 | attack | The IP 45.233.111.103 has just been banned by Fail2Ban after 3 attempts against Zimbra-audit. |
2020-03-11 20:10:33 |
59.16.163.225 | attack | Mar 11 11:34:38 Invalid user pi from 59.16.163.225 port 52742 |
2020-03-11 20:23:49 |
183.83.147.149 | attack | Unauthorized connection attempt from IP address 183.83.147.149 on Port 445(SMB) |
2020-03-11 20:03:20 |
62.122.244.227 | attackspambots | $f2bV_matches |
2020-03-11 20:23:21 |
180.180.29.83 | attackbotsspam | Attempted connection to ports 8291, 8728. |
2020-03-11 20:21:10 |
103.57.210.12 | attackspam | Mar 11 12:41:22 lukav-desktop sshd\[4494\]: Invalid user test from 103.57.210.12 Mar 11 12:41:22 lukav-desktop sshd\[4494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.210.12 Mar 11 12:41:24 lukav-desktop sshd\[4494\]: Failed password for invalid user test from 103.57.210.12 port 54668 ssh2 Mar 11 12:44:51 lukav-desktop sshd\[4543\]: Invalid user test from 103.57.210.12 Mar 11 12:44:51 lukav-desktop sshd\[4543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.210.12 |
2020-03-11 20:38:20 |
184.168.221.39 | attackspambots | SSH login attempts. |
2020-03-11 20:42:23 |
167.99.77.213 | attackspambots | Mar 11 09:10:07 XXX sshd[26600]: User r.r from 167.99.77.213 not allowed because none of user's groups are listed in AllowGroups Mar 11 09:10:07 XXX sshd[26600]: Received disconnect from 167.99.77.213: 11: Bye Bye [preauth] Mar 11 09:10:08 XXX sshd[26602]: Invalid user admin from 167.99.77.213 Mar 11 09:10:09 XXX sshd[26602]: Received disconnect from 167.99.77.213: 11: Bye Bye [preauth] Mar 11 09:10:10 XXX sshd[26604]: Invalid user admin from 167.99.77.213 Mar 11 09:10:10 XXX sshd[26604]: Received disconnect from 167.99.77.213: 11: Bye Bye [preauth] Mar 11 09:10:11 XXX sshd[26606]: Invalid user user from 167.99.77.213 Mar 11 09:10:12 XXX sshd[26606]: Received disconnect from 167.99.77.213: 11: Bye Bye [preauth] Mar 11 09:10:13 XXX sshd[26608]: Invalid user ubnt from 167.99.77.213 Mar 11 09:10:13 XXX sshd[26608]: Received disconnect from 167.99.77.213: 11: Bye Bye [preauth] Mar 11 09:10:14 XXX sshd[26610]: Invalid user admin from 167.99.77.213 Mar 11 09:10:15 XXX sshd[26........ ------------------------------- |
2020-03-11 20:37:08 |