City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: Cell C
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.7.146.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.7.146.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062801 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 02:51:41 CST 2025
;; MSG SIZE rcvd: 105
Host 14.146.7.105.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 14.146.7.105.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 117.64.232.220 | attack | [Aegis] @ 2019-09-05 20:10:21 0100 -> Attempt to use mail server as relay (550: Requested action not taken). |
2019-09-06 04:19:07 |
| 179.162.11.92 | attackbots | 400 BAD REQUEST |
2019-09-06 04:42:50 |
| 139.59.17.118 | attackbots | Sep 5 10:42:33 kapalua sshd\[14435\]: Invalid user bkpuser from 139.59.17.118 Sep 5 10:42:33 kapalua sshd\[14435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.17.118 Sep 5 10:42:35 kapalua sshd\[14435\]: Failed password for invalid user bkpuser from 139.59.17.118 port 45960 ssh2 Sep 5 10:47:28 kapalua sshd\[14862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.17.118 user=root Sep 5 10:47:30 kapalua sshd\[14862\]: Failed password for root from 139.59.17.118 port 60870 ssh2 |
2019-09-06 04:49:03 |
| 210.212.102.35 | attack | A device at the “210.212.102.35” IP address has made a large number of invalid login attempts against the account “amazonas”. This brute force attempt has exceeded the maximum number of failed login attempts that the system allows. For security purposes, the system has temporarily blocked this IP address in order to prevent further attempts. Service: pure-ftpd Local IP Address: 185.2.66.177 Local Port: 21 Remote IP Address: 210.212.102.35 Authentication Database: system Username: amazonas Number of authentication failures: 5 Maximum number allowed: 5 📙 Use the following links to add the appropriate entry to the blacklist: IP: https://webtown01.blacknight.ie:2087/scripts7/cphulk/blacklist?ip=210.212.102.35 IANA Netblock: https://webtown01.blacknight.ie:2087/scripts7/cphulk/blacklist?ip=210.212.102.32/28 /24: https://webtown01.blacknight.ie:2087/scripts7/cphulk/blacklist?ip=210.212.102.0/24 /16: https://webtown01.blacknight.ie:2087/scripts7/cphulk/blacklist?ip=210.212.0.0/16 |
2019-09-06 04:27:28 |
| 85.86.26.8 | attackspam | Sep 5 14:33:40 xb3 sshd[12797]: Failed password for invalid user user2 from 85.86.26.8 port 34220 ssh2 Sep 5 14:33:41 xb3 sshd[12797]: Received disconnect from 85.86.26.8: 11: Bye Bye [preauth] Sep 5 14:56:55 xb3 sshd[11249]: Failed password for invalid user ftpuser from 85.86.26.8 port 51034 ssh2 Sep 5 14:56:55 xb3 sshd[11249]: Received disconnect from 85.86.26.8: 11: Bye Bye [preauth] Sep 5 15:06:44 xb3 sshd[13152]: Failed password for invalid user test from 85.86.26.8 port 50092 ssh2 Sep 5 15:06:44 xb3 sshd[13152]: Received disconnect from 85.86.26.8: 11: Bye Bye [preauth] Sep 5 15:16:50 xb3 sshd[14630]: Failed password for invalid user ubuntu from 85.86.26.8 port 49252 ssh2 Sep 5 15:16:50 xb3 sshd[14630]: Received disconnect from 85.86.26.8: 11: Bye Bye [preauth] Sep 5 15:21:47 xb3 sshd[13480]: Failed password for invalid user webmaster from 85.86.26.8 port 48786 ssh2 Sep 5 15:21:47 xb3 sshd[13480]: Received disconnect from 85.86.26.8: 11: Bye Bye [preauth........ ------------------------------- |
2019-09-06 04:18:44 |
| 217.105.129.31 | attackspam | Too many connections or unauthorized access detected from Oscar banned ip |
2019-09-06 04:57:10 |
| 196.189.91.134 | attackspambots | firewall-block, port(s): 445/tcp |
2019-09-06 04:32:03 |
| 116.193.159.66 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-09-06 04:43:49 |
| 104.248.71.7 | attackspambots | Feb 17 23:19:42 vtv3 sshd\[25664\]: Invalid user ftp from 104.248.71.7 port 33708 Feb 17 23:19:42 vtv3 sshd\[25664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.71.7 Feb 17 23:19:43 vtv3 sshd\[25664\]: Failed password for invalid user ftp from 104.248.71.7 port 33708 ssh2 Feb 17 23:27:37 vtv3 sshd\[28259\]: Invalid user maya from 104.248.71.7 port 52044 Feb 17 23:27:37 vtv3 sshd\[28259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.71.7 Feb 19 21:30:32 vtv3 sshd\[25377\]: Invalid user mapsusa from 104.248.71.7 port 60444 Feb 19 21:30:32 vtv3 sshd\[25377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.71.7 Feb 19 21:30:33 vtv3 sshd\[25377\]: Failed password for invalid user mapsusa from 104.248.71.7 port 60444 ssh2 Feb 19 21:36:00 vtv3 sshd\[26847\]: Invalid user agus from 104.248.71.7 port 50452 Feb 19 21:36:00 vtv3 sshd\[26847\]: pam_unix\(sshd:a |
2019-09-06 04:47:36 |
| 151.21.21.48 | attackspambots | Telnetd brute force attack detected by fail2ban |
2019-09-06 04:40:43 |
| 104.200.134.150 | attackspam | frenzy |
2019-09-06 04:44:13 |
| 197.155.115.60 | attackspam | Sep 5 21:10:07 bouncer sshd\[7086\]: Invalid user pi from 197.155.115.60 port 58844 Sep 5 21:10:07 bouncer sshd\[7086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.115.60 Sep 5 21:10:07 bouncer sshd\[7088\]: Invalid user pi from 197.155.115.60 port 58846 ... |
2019-09-06 04:36:24 |
| 1.32.250.141 | attackbotsspam | firewall-block, port(s): 445/tcp |
2019-09-06 04:45:37 |
| 208.79.200.80 | attackspam | fire |
2019-09-06 04:44:33 |
| 72.11.168.29 | attackbots | Sep 5 10:38:19 friendsofhawaii sshd\[18756\]: Invalid user postgres from 72.11.168.29 Sep 5 10:38:19 friendsofhawaii sshd\[18756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72-11-168-29.cpe.axion.ca Sep 5 10:38:20 friendsofhawaii sshd\[18756\]: Failed password for invalid user postgres from 72.11.168.29 port 41336 ssh2 Sep 5 10:44:43 friendsofhawaii sshd\[19406\]: Invalid user student from 72.11.168.29 Sep 5 10:44:43 friendsofhawaii sshd\[19406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72-11-168-29.cpe.axion.ca |
2019-09-06 04:55:19 |