City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.205.132.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58060
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.205.132.48. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 22:34:47 CST 2025
;; MSG SIZE rcvd: 107
48.132.205.129.in-addr.arpa domain name pointer 129-205-132-48.dynamic.macrolan.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
48.132.205.129.in-addr.arpa name = 129-205-132-48.dynamic.macrolan.co.za.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 110.83.16.211 | attackbotsspam | Sep 29 14:39:53 hcbbdb sshd\[8866\]: Invalid user mcserver from 110.83.16.211 Sep 29 14:39:53 hcbbdb sshd\[8866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.83.16.211 Sep 29 14:39:55 hcbbdb sshd\[8866\]: Failed password for invalid user mcserver from 110.83.16.211 port 16092 ssh2 Sep 29 14:45:31 hcbbdb sshd\[9430\]: Invalid user manager from 110.83.16.211 Sep 29 14:45:31 hcbbdb sshd\[9430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.83.16.211 |
2019-09-29 22:50:18 |
| 123.206.45.16 | attackspam | Sep 29 04:40:07 hcbb sshd\[13037\]: Invalid user ya from 123.206.45.16 Sep 29 04:40:07 hcbb sshd\[13037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.45.16 Sep 29 04:40:09 hcbb sshd\[13037\]: Failed password for invalid user ya from 123.206.45.16 port 41974 ssh2 Sep 29 04:46:18 hcbb sshd\[13542\]: Invalid user comunicazioni from 123.206.45.16 Sep 29 04:46:18 hcbb sshd\[13542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.45.16 |
2019-09-29 22:49:09 |
| 124.93.2.233 | attackspam | ssh failed login |
2019-09-29 22:56:37 |
| 67.218.96.156 | attackbots | ssh failed login |
2019-09-29 22:55:33 |
| 27.117.163.21 | attackspambots | Sep 29 14:42:57 game-panel sshd[21608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.117.163.21 Sep 29 14:42:59 game-panel sshd[21608]: Failed password for invalid user admin from 27.117.163.21 port 54010 ssh2 Sep 29 14:49:05 game-panel sshd[21830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.117.163.21 |
2019-09-29 22:49:28 |
| 222.186.180.8 | attackbotsspam | Sep 29 21:35:16 webhost01 sshd[27630]: Failed password for root from 222.186.180.8 port 35440 ssh2 Sep 29 21:35:34 webhost01 sshd[27630]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 35440 ssh2 [preauth] ... |
2019-09-29 22:44:58 |
| 200.146.232.97 | attackspam | Sep 29 14:06:45 mail sshd\[18533\]: Invalid user kb from 200.146.232.97 Sep 29 14:06:45 mail sshd\[18533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97 Sep 29 14:06:48 mail sshd\[18533\]: Failed password for invalid user kb from 200.146.232.97 port 36838 ssh2 ... |
2019-09-29 23:07:49 |
| 120.72.83.204 | attackspambots | 445/tcp 445/tcp 445/tcp... [2019-09-02/29]7pkt,1pt.(tcp) |
2019-09-29 23:05:06 |
| 79.160.45.35 | attackbots | Sep 29 16:40:05 localhost sshd\[7710\]: Invalid user oracle from 79.160.45.35 port 33114 Sep 29 16:40:05 localhost sshd\[7710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.160.45.35 Sep 29 16:40:07 localhost sshd\[7710\]: Failed password for invalid user oracle from 79.160.45.35 port 33114 ssh2 |
2019-09-29 22:44:08 |
| 51.75.171.150 | attackbotsspam | 2019-09-29T14:02:50.978652lon01.zurich-datacenter.net sshd\[10701\]: Invalid user vweru from 51.75.171.150 port 58214 2019-09-29T14:02:50.985794lon01.zurich-datacenter.net sshd\[10701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.ip-51-75-171.eu 2019-09-29T14:02:53.014998lon01.zurich-datacenter.net sshd\[10701\]: Failed password for invalid user vweru from 51.75.171.150 port 58214 ssh2 2019-09-29T14:07:04.067313lon01.zurich-datacenter.net sshd\[10802\]: Invalid user kristine from 51.75.171.150 port 42420 2019-09-29T14:07:04.074504lon01.zurich-datacenter.net sshd\[10802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.ip-51-75-171.eu ... |
2019-09-29 22:58:07 |
| 175.198.11.150 | attackspambots | Sep 29 18:20:23 www5 sshd\[48843\]: Invalid user user from 175.198.11.150 Sep 29 18:20:23 www5 sshd\[48843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.198.11.150 Sep 29 18:20:25 www5 sshd\[48843\]: Failed password for invalid user user from 175.198.11.150 port 33728 ssh2 ... |
2019-09-29 23:27:02 |
| 185.175.93.14 | attackspam | 09/29/2019-10:41:19.056314 185.175.93.14 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-09-29 22:49:45 |
| 51.75.133.167 | attackspambots | Sep 29 17:20:39 vps647732 sshd[11234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.133.167 Sep 29 17:20:41 vps647732 sshd[11234]: Failed password for invalid user dp from 51.75.133.167 port 39392 ssh2 ... |
2019-09-29 23:29:44 |
| 5.253.19.142 | attack | [portscan] Port scan |
2019-09-29 23:14:00 |
| 221.202.150.210 | attackspambots | Automated reporting of FTP Brute Force |
2019-09-29 23:12:59 |