City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.232.138.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15409
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.232.138.55. IN A
;; AUTHORITY SECTION:
. 282 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:50:19 CST 2022
;; MSG SIZE rcvd: 107
55.138.232.129.in-addr.arpa domain name pointer dedi606.jnb2.host-h.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
55.138.232.129.in-addr.arpa name = dedi606.jnb2.host-h.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 31.154.84.141 | attack | port scan and connect, tcp 81 (hosts2-ns) |
2019-08-28 06:56:55 |
| 190.113.142.197 | attackspambots | Aug 27 19:34:40 localhost sshd\[12092\]: Invalid user ubuntu1 from 190.113.142.197 port 57425 Aug 27 19:34:40 localhost sshd\[12092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.113.142.197 Aug 27 19:34:42 localhost sshd\[12092\]: Failed password for invalid user ubuntu1 from 190.113.142.197 port 57425 ssh2 ... |
2019-08-28 06:50:50 |
| 85.222.123.94 | attackbots | Aug 27 17:55:48 plusreed sshd[20772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.222.123.94 user=root Aug 27 17:55:50 plusreed sshd[20772]: Failed password for root from 85.222.123.94 port 54958 ssh2 ... |
2019-08-28 07:10:56 |
| 89.43.67.45 | attackspam | Unauthorised access (Aug 27) SRC=89.43.67.45 LEN=40 TTL=241 ID=38057 TCP DPT=445 WINDOW=1024 SYN |
2019-08-28 06:40:58 |
| 51.145.209.130 | attackbotsspam | Aug 27 21:44:26 MK-Soft-VM5 sshd\[11241\]: Invalid user joshua from 51.145.209.130 port 32992 Aug 27 21:44:26 MK-Soft-VM5 sshd\[11241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.145.209.130 Aug 27 21:44:29 MK-Soft-VM5 sshd\[11241\]: Failed password for invalid user joshua from 51.145.209.130 port 32992 ssh2 ... |
2019-08-28 06:38:05 |
| 94.23.41.222 | attackspambots | Aug 27 18:49:39 ny01 sshd[4703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.41.222 Aug 27 18:49:40 ny01 sshd[4703]: Failed password for invalid user tristan from 94.23.41.222 port 50581 ssh2 Aug 27 18:53:19 ny01 sshd[5269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.41.222 |
2019-08-28 07:01:39 |
| 201.249.167.250 | attack | Unauthorized connection attempt from IP address 201.249.167.250 on Port 445(SMB) |
2019-08-28 07:19:26 |
| 51.75.248.241 | attack | Aug 27 22:46:52 [host] sshd[32057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.241 user=root Aug 27 22:46:54 [host] sshd[32057]: Failed password for root from 51.75.248.241 port 37670 ssh2 Aug 27 22:50:59 [host] sshd[32096]: Invalid user ayanami from 51.75.248.241 |
2019-08-28 06:44:00 |
| 135.84.81.127 | attackspambots | spam email from ervie=sophiads.com@zcsend.net on behalf of Jide Alufa |
2019-08-28 06:46:47 |
| 206.189.145.152 | attackbots | $f2bV_matches |
2019-08-28 07:05:34 |
| 201.89.50.221 | attack | Aug 28 00:55:46 vps647732 sshd[31585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.89.50.221 Aug 28 00:55:48 vps647732 sshd[31585]: Failed password for invalid user user from 201.89.50.221 port 34858 ssh2 ... |
2019-08-28 07:00:26 |
| 80.211.30.166 | attackbots | Aug 28 00:50:04 yabzik sshd[794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.30.166 Aug 28 00:50:06 yabzik sshd[794]: Failed password for invalid user rtkid from 80.211.30.166 port 40054 ssh2 Aug 28 00:54:28 yabzik sshd[2188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.30.166 |
2019-08-28 06:47:41 |
| 36.66.156.125 | attack | Invalid user lexical from 36.66.156.125 port 36334 |
2019-08-28 06:56:04 |
| 124.41.211.27 | attack | Aug 27 21:10:14 web8 sshd\[19039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.41.211.27 user=root Aug 27 21:10:16 web8 sshd\[19039\]: Failed password for root from 124.41.211.27 port 37330 ssh2 Aug 27 21:17:44 web8 sshd\[22728\]: Invalid user tester from 124.41.211.27 Aug 27 21:17:44 web8 sshd\[22728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.41.211.27 Aug 27 21:17:47 web8 sshd\[22728\]: Failed password for invalid user tester from 124.41.211.27 port 37340 ssh2 |
2019-08-28 06:36:40 |
| 178.159.100.234 | attack | B: Magento admin pass test (wrong country) |
2019-08-28 06:33:47 |