City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.245.54.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28499
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;197.245.54.201. IN A
;; AUTHORITY SECTION:
. 247 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 20:00:45 CST 2022
;; MSG SIZE rcvd: 107
201.54.245.197.in-addr.arpa domain name pointer dsl-197-245-54-201.voxdsl.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
201.54.245.197.in-addr.arpa name = dsl-197-245-54-201.voxdsl.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
167.114.98.234 | attack | (sshd) Failed SSH login from 167.114.98.234 (CA/Canada/234.ip-167-114-98.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 05:54:18 ubnt-55d23 sshd[24598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.234 user=root Mar 31 05:54:20 ubnt-55d23 sshd[24598]: Failed password for root from 167.114.98.234 port 36623 ssh2 |
2020-03-31 13:23:41 |
51.83.44.246 | attack | Mar 31 06:49:00 prox sshd[9919]: Failed password for root from 51.83.44.246 port 34046 ssh2 |
2020-03-31 13:38:21 |
172.217.10.14 | attack | https://awsamazone.page.link/5D2A |
2020-03-31 13:49:19 |
157.245.202.159 | attack | Mar 31 01:15:33 NPSTNNYC01T sshd[26264]: Failed password for root from 157.245.202.159 port 57548 ssh2 Mar 31 01:19:56 NPSTNNYC01T sshd[26547]: Failed password for root from 157.245.202.159 port 42316 ssh2 ... |
2020-03-31 13:45:13 |
106.12.125.241 | attack | ssh brute force |
2020-03-31 13:49:48 |
14.143.64.114 | attack | Invalid user kq from 14.143.64.114 port 40126 |
2020-03-31 14:03:46 |
210.175.50.124 | attackbots | 2020-03-31T07:26:40.355146ns386461 sshd\[29558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.175.50.124 user=root 2020-03-31T07:26:43.102573ns386461 sshd\[29558\]: Failed password for root from 210.175.50.124 port 32672 ssh2 2020-03-31T07:33:42.086737ns386461 sshd\[3412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.175.50.124 user=root 2020-03-31T07:33:44.102434ns386461 sshd\[3412\]: Failed password for root from 210.175.50.124 port 17932 ssh2 2020-03-31T07:37:10.201772ns386461 sshd\[6492\]: Invalid user kh from 210.175.50.124 port 16887 2020-03-31T07:37:10.206358ns386461 sshd\[6492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.175.50.124 ... |
2020-03-31 13:51:59 |
2.61.249.208 | attackbotsspam | " " |
2020-03-31 13:43:24 |
14.228.186.184 | attackspam | 1585626810 - 03/31/2020 05:53:30 Host: 14.228.186.184/14.228.186.184 Port: 445 TCP Blocked |
2020-03-31 14:02:31 |
194.152.206.93 | attack | SSH bruteforce |
2020-03-31 13:40:49 |
82.64.243.100 | attack | Mar 31 05:25:11 mail sshd[5268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.243.100 user=root Mar 31 05:25:13 mail sshd[5268]: Failed password for root from 82.64.243.100 port 37496 ssh2 Mar 31 07:33:09 mail sshd[11537]: Invalid user test from 82.64.243.100 Mar 31 07:33:09 mail sshd[11537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.243.100 Mar 31 07:33:09 mail sshd[11537]: Invalid user test from 82.64.243.100 Mar 31 07:33:12 mail sshd[11537]: Failed password for invalid user test from 82.64.243.100 port 46796 ssh2 ... |
2020-03-31 13:46:18 |
54.39.50.204 | attackspam | 2020-03-29 03:20:38 server sshd[90471]: Failed password for invalid user adrian from 54.39.50.204 port 20806 ssh2 |
2020-03-31 14:03:19 |
180.107.4.64 | attackspam | Mar 31 06:16:52 DAAP sshd[23066]: Invalid user deploy from 180.107.4.64 port 43396 Mar 31 06:16:52 DAAP sshd[23066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.107.4.64 Mar 31 06:16:52 DAAP sshd[23066]: Invalid user deploy from 180.107.4.64 port 43396 Mar 31 06:16:53 DAAP sshd[23066]: Failed password for invalid user deploy from 180.107.4.64 port 43396 ssh2 Mar 31 06:22:56 DAAP sshd[23150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.107.4.64 user=root Mar 31 06:22:59 DAAP sshd[23150]: Failed password for root from 180.107.4.64 port 34142 ssh2 ... |
2020-03-31 14:01:08 |
115.73.219.205 | attackbotsspam | 1585626840 - 03/31/2020 05:54:00 Host: 115.73.219.205/115.73.219.205 Port: 445 TCP Blocked |
2020-03-31 13:41:20 |
188.131.217.33 | attackbotsspam | fail2ban/Mar 31 03:47:17 h1962932 sshd[19675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.217.33 user=root Mar 31 03:47:18 h1962932 sshd[19675]: Failed password for root from 188.131.217.33 port 54080 ssh2 Mar 31 03:50:31 h1962932 sshd[19832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.217.33 user=root Mar 31 03:50:33 h1962932 sshd[19832]: Failed password for root from 188.131.217.33 port 55918 ssh2 Mar 31 03:53:38 h1962932 sshd[19931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.217.33 user=root Mar 31 03:53:39 h1962932 sshd[19931]: Failed password for root from 188.131.217.33 port 57756 ssh2 |
2020-03-31 13:55:37 |