City: Johannesburg
Region: Gauteng
Country: South Africa
Internet Service Provider: Verizon
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.195.157.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;152.195.157.54.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:45:34 CST 2025
;; MSG SIZE  rcvd: 107Host 54.157.195.152.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 54.157.195.152.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 89.248.168.112 | attackbots | firewall-block, port(s): 23/tcp | 2019-06-22 13:21:23 | 
| 23.254.215.75 | attackbotsspam | RDP Scan | 2019-06-22 12:51:01 | 
| 61.136.81.234 | attack | 'IP reached maximum auth failures for a one day block' | 2019-06-22 13:17:48 | 
| 194.165.133.143 | attackbotsspam | firewall-block, port(s): 23/tcp | 2019-06-22 13:15:57 | 
| 185.244.25.96 | attackbots | 8080/tcp [2019-06-22]1pkt | 2019-06-22 13:13:09 | 
| 173.208.130.202 | attackbotsspam | 20 attempts against mh-misbehave-ban on sea.magehost.pro | 2019-06-22 13:04:34 | 
| 111.242.138.147 | attack | 37215/tcp [2019-06-22]1pkt | 2019-06-22 13:02:13 | 
| 58.210.6.53 | attack | Jun 22 06:38:38 s64-1 sshd[8938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.6.53 Jun 22 06:38:40 s64-1 sshd[8938]: Failed password for invalid user appuser from 58.210.6.53 port 59289 ssh2 Jun 22 06:40:28 s64-1 sshd[8949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.6.53 ... | 2019-06-22 13:10:30 | 
| 188.19.184.166 | attack | 23/tcp [2019-06-22]1pkt | 2019-06-22 12:44:21 | 
| 47.105.71.189 | attack | GET /TP/public/index.php HTTP/1.1 etc. | 2019-06-22 12:59:38 | 
| 66.249.79.121 | attack | Automatic report - Web App Attack | 2019-06-22 13:37:45 | 
| 58.242.83.31 | attackbotsspam | 2019-06-22T06:43:44.997192scmdmz1 sshd\[7344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.242.83.31 user=root 2019-06-22T06:43:47.205347scmdmz1 sshd\[7344\]: Failed password for root from 58.242.83.31 port 42880 ssh2 2019-06-22T06:43:49.388149scmdmz1 sshd\[7344\]: Failed password for root from 58.242.83.31 port 42880 ssh2 ... | 2019-06-22 12:50:23 | 
| 221.140.112.105 | attack | 19/6/22@00:40:12: FAIL: IoT-Telnet address from=221.140.112.105 ... | 2019-06-22 13:15:36 | 
| 219.91.66.9 | attack | Jun 22 04:55:54 localhost sshd\[125805\]: Invalid user guest from 219.91.66.9 port 55376 Jun 22 04:55:54 localhost sshd\[125805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.66.9 Jun 22 04:55:56 localhost sshd\[125805\]: Failed password for invalid user guest from 219.91.66.9 port 55376 ssh2 Jun 22 04:57:35 localhost sshd\[125847\]: Invalid user zui from 219.91.66.9 port 41452 Jun 22 04:57:35 localhost sshd\[125847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.66.9 ... | 2019-06-22 13:25:44 | 
| 54.37.74.171 | attackspam | Automatic report generated by Wazuh | 2019-06-22 13:12:12 |