City: Johannesburg
Region: Gauteng
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.141.162.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48172
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;146.141.162.40. IN A
;; AUTHORITY SECTION:
. 594 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023110401 1800 900 604800 86400
;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 05 04:45:13 CST 2023
;; MSG SIZE rcvd: 107
40.162.141.146.in-addr.arpa domain name pointer pc40.pkres.wits.ac.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.162.141.146.in-addr.arpa name = pc40.pkres.wits.ac.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
105.98.15.161 | attackspam | [08/Jul/2019:20:44:56 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1" |
2019-07-09 05:22:45 |
187.171.242.195 | attack | 445/tcp [2019-07-08]1pkt |
2019-07-09 05:47:49 |
206.189.119.73 | attackspambots | Jul 8 14:44:12 xm3 sshd[13911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.73 user=r.r Jul 8 14:44:14 xm3 sshd[13911]: Failed password for r.r from 206.189.119.73 port 49448 ssh2 Jul 8 14:44:14 xm3 sshd[13911]: Received disconnect from 206.189.119.73: 11: Bye Bye [preauth] Jul 8 14:46:48 xm3 sshd[20461]: Failed password for invalid user dc from 206.189.119.73 port 48938 ssh2 Jul 8 14:46:48 xm3 sshd[20461]: Received disconnect from 206.189.119.73: 11: Bye Bye [preauth] Jul 8 14:48:35 xm3 sshd[23304]: Failed password for invalid user lai from 206.189.119.73 port 38088 ssh2 Jul 8 14:48:35 xm3 sshd[23304]: Received disconnect from 206.189.119.73: 11: Bye Bye [preauth] Jul 8 14:50:13 xm3 sshd[30717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.73 user=r.r Jul 8 14:50:16 xm3 sshd[30717]: Failed password for r.r from 206.189.119.73 port 55472 ssh2 Jul 8 ........ ------------------------------- |
2019-07-09 06:06:48 |
104.40.240.212 | attack | 3389BruteforceFW22 |
2019-07-09 05:56:33 |
193.70.36.161 | attackbots | Brute force SMTP login attempted. ... |
2019-07-09 06:10:01 |
206.189.131.213 | attack | Jul 8 23:29:27 ArkNodeAT sshd\[2587\]: Invalid user juan from 206.189.131.213 Jul 8 23:29:27 ArkNodeAT sshd\[2587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.131.213 Jul 8 23:29:29 ArkNodeAT sshd\[2587\]: Failed password for invalid user juan from 206.189.131.213 port 52396 ssh2 |
2019-07-09 05:48:31 |
62.5.185.121 | attack | 23/tcp [2019-07-08]1pkt |
2019-07-09 05:23:10 |
113.228.77.27 | attackspambots | 23/tcp 23/tcp [2019-07-08]2pkt |
2019-07-09 05:45:17 |
139.59.170.23 | attackbots | Automatic report - Web App Attack |
2019-07-09 05:42:24 |
36.66.149.211 | attackspambots | ssh bruteforce or scan ... |
2019-07-09 06:09:45 |
114.40.184.55 | attackspambots | 37215/tcp [2019-07-08]1pkt |
2019-07-09 05:46:43 |
79.8.245.19 | attackbots | $f2bV_matches |
2019-07-09 05:44:29 |
184.82.10.76 | attackspam | frenzy |
2019-07-09 05:30:36 |
66.249.64.135 | attackspambots | Automatic report - Web App Attack |
2019-07-09 05:40:47 |
113.121.168.252 | attackbotsspam | Multiple failed FTP logins |
2019-07-09 05:53:35 |