City: Cape Town
Region: Western Cape
Country: South Africa
Internet Service Provider: Telkom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.210.21.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.210.21.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031001 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 11 01:56:44 CST 2025
;; MSG SIZE rcvd: 106
55.21.210.196.in-addr.arpa domain name pointer 196-210-21-55.ftth.web.africa.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
55.21.210.196.in-addr.arpa name = 196-210-21-55.ftth.web.africa.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
192.3.247.10 | attackspambots | $f2bV_matches |
2020-08-30 01:55:29 |
122.166.237.117 | attackspambots | Aug 29 17:46:37 vps647732 sshd[4003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.166.237.117 Aug 29 17:46:39 vps647732 sshd[4003]: Failed password for invalid user tester from 122.166.237.117 port 32274 ssh2 ... |
2020-08-30 02:03:59 |
49.88.112.112 | attack | August 29 2020, 13:31:56 [sshd] - Banned from the Mad Pony WordPress hosting platform by Fail2ban. |
2020-08-30 01:48:07 |
87.189.118.158 | attackspambots | 2020-08-29T12:05:55.895634server.espacesoutien.com sshd[29565]: Invalid user osboxes from 87.189.118.158 port 41699 2020-08-29T12:05:57.491637server.espacesoutien.com sshd[29565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.189.118.158 2020-08-29T12:05:55.895634server.espacesoutien.com sshd[29565]: Invalid user osboxes from 87.189.118.158 port 41699 2020-08-29T12:05:59.281004server.espacesoutien.com sshd[29565]: Failed password for invalid user osboxes from 87.189.118.158 port 41699 ssh2 ... |
2020-08-30 02:02:44 |
188.166.39.19 | attackbots | Aug 29 14:28:50 plex-server sshd[440350]: Invalid user lukas from 188.166.39.19 port 54332 Aug 29 14:28:50 plex-server sshd[440350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.39.19 Aug 29 14:28:50 plex-server sshd[440350]: Invalid user lukas from 188.166.39.19 port 54332 Aug 29 14:28:52 plex-server sshd[440350]: Failed password for invalid user lukas from 188.166.39.19 port 54332 ssh2 Aug 29 14:33:01 plex-server sshd[442121]: Invalid user beatriz from 188.166.39.19 port 36460 ... |
2020-08-30 01:49:51 |
222.186.169.192 | attack | 2020-08-29T20:42:36.666851afi-git.jinr.ru sshd[30103]: Failed password for root from 222.186.169.192 port 16756 ssh2 2020-08-29T20:42:39.825806afi-git.jinr.ru sshd[30103]: Failed password for root from 222.186.169.192 port 16756 ssh2 2020-08-29T20:42:43.536986afi-git.jinr.ru sshd[30103]: Failed password for root from 222.186.169.192 port 16756 ssh2 2020-08-29T20:42:43.537129afi-git.jinr.ru sshd[30103]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 16756 ssh2 [preauth] 2020-08-29T20:42:43.537142afi-git.jinr.ru sshd[30103]: Disconnecting: Too many authentication failures [preauth] ... |
2020-08-30 01:54:42 |
140.143.248.32 | attackspam | 2020-08-29T14:06:40+0200 Failed SSH Authentication/Brute Force Attack. (Server 5) |
2020-08-30 01:35:46 |
192.241.229.55 | attackbotsspam | "Found User-Agent associated with security scanner - Matched Data: zgrab found within REQUEST_HEADERS:User-Agent: mozilla/5.0 zgrab/0.x" |
2020-08-30 01:32:15 |
119.28.238.101 | attack | $f2bV_matches |
2020-08-30 01:29:10 |
91.225.78.245 | attackspam | 20/8/29@08:06:01: FAIL: Alarm-Network address from=91.225.78.245 20/8/29@08:06:01: FAIL: Alarm-Network address from=91.225.78.245 ... |
2020-08-30 01:59:51 |
222.186.173.154 | attackbotsspam | Aug 29 19:18:52 minden010 sshd[10526]: Failed password for root from 222.186.173.154 port 29948 ssh2 Aug 29 19:18:55 minden010 sshd[10526]: Failed password for root from 222.186.173.154 port 29948 ssh2 Aug 29 19:18:59 minden010 sshd[10526]: Failed password for root from 222.186.173.154 port 29948 ssh2 Aug 29 19:19:05 minden010 sshd[10526]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 29948 ssh2 [preauth] ... |
2020-08-30 01:25:04 |
191.54.83.191 | attack | 1598702809 - 08/29/2020 14:06:49 Host: 191.54.83.191/191.54.83.191 Port: 445 TCP Blocked |
2020-08-30 01:27:11 |
5.178.181.231 | attackbotsspam | 1598702787 - 08/29/2020 14:06:27 Host: 5.178.181.231/5.178.181.231 Port: 445 TCP Blocked |
2020-08-30 01:41:54 |
103.220.30.6 | attackspam | port scan and connect, tcp 23 (telnet) |
2020-08-30 01:38:21 |
162.196.204.142 | attackspam | Aug 29 12:03:26 game-panel sshd[3940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.196.204.142 Aug 29 12:03:28 game-panel sshd[3940]: Failed password for invalid user vt from 162.196.204.142 port 47990 ssh2 Aug 29 12:06:56 game-panel sshd[4077]: Failed password for root from 162.196.204.142 port 59688 ssh2 |
2020-08-30 01:22:21 |