City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.239.132.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;197.239.132.205.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 01:27:37 CST 2025
;; MSG SIZE  rcvd: 108
        205.132.239.197.in-addr.arpa domain name pointer 50-eb-f6-9b-db-5a.lan.uct.ac.za.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
205.132.239.197.in-addr.arpa	name = 50-eb-f6-9b-db-5a.lan.uct.ac.za.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 180.106.83.17 | attackbots | Invalid user fp from 180.106.83.17 port 48846  | 
                    2020-04-16 16:21:43 | 
| 221.229.175.141 | attackspambots | Apr 16 07:43:57 ms-srv sshd[50229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.229.175.141 Apr 16 07:43:59 ms-srv sshd[50229]: Failed password for invalid user admin from 221.229.175.141 port 41992 ssh2  | 
                    2020-04-16 16:34:36 | 
| 49.68.145.178 | attackspam | Email rejected due to spam filtering  | 
                    2020-04-16 16:40:53 | 
| 197.253.19.74 | attack | 2020-04-16T03:02:16.3399461495-001 sshd[36008]: Invalid user postgres from 197.253.19.74 port 12120 2020-04-16T03:02:17.9884191495-001 sshd[36008]: Failed password for invalid user postgres from 197.253.19.74 port 12120 ssh2 2020-04-16T03:08:59.4180271495-001 sshd[36426]: Invalid user a from 197.253.19.74 port 50855 2020-04-16T03:08:59.4245801495-001 sshd[36426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.19.74 2020-04-16T03:08:59.4180271495-001 sshd[36426]: Invalid user a from 197.253.19.74 port 50855 2020-04-16T03:09:01.3961071495-001 sshd[36426]: Failed password for invalid user a from 197.253.19.74 port 50855 ssh2 ...  | 
                    2020-04-16 16:15:27 | 
| 41.83.229.202 | attackspambots | 2020-04-16 dovecot_login authenticator failed for \(ylmf-pc\) \[41.83.229.202\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl\) 2020-04-16 dovecot_login authenticator failed for \(ylmf-pc\) \[41.83.229.202\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl\) 2020-04-16 dovecot_login authenticator failed for \(ylmf-pc\) \[41.83.229.202\]: 535 Incorrect authentication data \(set_id=**REMOVED****REMOVED****REMOVED**_perl\)  | 
                    2020-04-16 16:33:59 | 
| 37.252.187.140 | attack | Apr 16 04:04:24 NPSTNNYC01T sshd[8633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.252.187.140 Apr 16 04:04:26 NPSTNNYC01T sshd[8633]: Failed password for invalid user farid from 37.252.187.140 port 35010 ssh2 Apr 16 04:07:57 NPSTNNYC01T sshd[9064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.252.187.140 ...  | 
                    2020-04-16 16:21:27 | 
| 192.241.239.112 | attackbots | Unauthorized connection attempt detected from IP address 192.241.239.112 to port 115  | 
                    2020-04-16 16:26:30 | 
| 120.201.125.191 | attackbots | Apr 16 10:40:55 lukav-desktop sshd\[7882\]: Invalid user mt from 120.201.125.191 Apr 16 10:40:55 lukav-desktop sshd\[7882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.201.125.191 Apr 16 10:40:57 lukav-desktop sshd\[7882\]: Failed password for invalid user mt from 120.201.125.191 port 37212 ssh2 Apr 16 10:44:25 lukav-desktop sshd\[8057\]: Invalid user system from 120.201.125.191 Apr 16 10:44:25 lukav-desktop sshd\[8057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.201.125.191  | 
                    2020-04-16 16:33:27 | 
| 188.83.98.193 | attack | Automatic report - Port Scan Attack  | 
                    2020-04-16 16:19:47 | 
| 119.28.132.211 | attackbotsspam | Found by fail2ban  | 
                    2020-04-16 16:37:08 | 
| 147.160.0.4 | attack | invalid user  | 
                    2020-04-16 16:29:31 | 
| 190.85.54.158 | attack | Apr 16 01:00:53 mockhub sshd[13961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.54.158 Apr 16 01:00:55 mockhub sshd[13961]: Failed password for invalid user admin from 190.85.54.158 port 35670 ssh2 ...  | 
                    2020-04-16 16:07:43 | 
| 222.66.99.98 | attack | Apr 16 06:22:00 *** sshd[5307]: Invalid user test from 222.66.99.98  | 
                    2020-04-16 16:28:32 | 
| 167.99.231.70 | attackbots | (sshd) Failed SSH login from 167.99.231.70 (US/United States/-): 5 in the last 3600 secs  | 
                    2020-04-16 16:18:05 | 
| 206.189.180.191 | attack | SSH Scan  | 
                    2020-04-16 16:27:19 |