City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.54.223.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18484
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.54.223.245. IN A
;; AUTHORITY SECTION:
. 188 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:05:30 CST 2022
;; MSG SIZE rcvd: 107
245.223.54.198.in-addr.arpa domain name pointer libproxy.cput.ac.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.223.54.198.in-addr.arpa name = libproxy.cput.ac.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
92.97.75.77 | attackbotsspam | Automatic report - Port Scan Attack |
2019-08-11 12:13:07 |
217.99.141.127 | attack | Automatic report - Port Scan Attack |
2019-08-11 12:20:37 |
125.124.114.129 | attackspam | RDP Brute-Force (Grieskirchen RZ1) |
2019-08-11 12:38:45 |
220.191.208.139 | attackbotsspam | Apr 21 19:23:05 motanud sshd\[18218\]: Invalid user test from 220.191.208.139 port 49382 Apr 21 19:23:05 motanud sshd\[18218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.191.208.139 Apr 21 19:23:07 motanud sshd\[18218\]: Failed password for invalid user test from 220.191.208.139 port 49382 ssh2 Apr 21 23:45:46 motanud sshd\[12036\]: Invalid user sun from 220.191.208.139 port 52816 Apr 21 23:45:46 motanud sshd\[12036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.191.208.139 Apr 21 23:45:48 motanud sshd\[12036\]: Failed password for invalid user sun from 220.191.208.139 port 52816 ssh2 |
2019-08-11 12:37:53 |
212.113.132.65 | attackspambots | 11.08.2019 00:25:52 - Wordpress fail Detected by ELinOX-ALM |
2019-08-11 11:58:47 |
198.27.118.104 | attack | *Port Scan* detected from 198.27.118.104 (CA/Canada/-). 4 hits in the last 71 seconds |
2019-08-11 12:16:10 |
183.2.202.41 | attackbots | " " |
2019-08-11 12:32:41 |
220.95.232.46 | attack | Dec 21 06:03:05 motanud sshd\[19942\]: Invalid user vc from 220.95.232.46 port 37564 Dec 21 06:03:05 motanud sshd\[19942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.95.232.46 Dec 21 06:03:07 motanud sshd\[19942\]: Failed password for invalid user vc from 220.95.232.46 port 37564 ssh2 |
2019-08-11 12:21:20 |
124.225.15.15 | attack | Automatic report - Port Scan Attack |
2019-08-11 12:40:57 |
221.0.183.42 | attackbots | Mar 8 06:20:58 motanud sshd\[30186\]: Invalid user ankit from 221.0.183.42 port 44186 Mar 8 06:20:58 motanud sshd\[30186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.0.183.42 Mar 8 06:21:00 motanud sshd\[30186\]: Failed password for invalid user ankit from 221.0.183.42 port 44186 ssh2 |
2019-08-11 12:20:08 |
50.248.154.57 | attackbots | Jan 12 23:06:45 motanud sshd\[17336\]: Invalid user teste from 50.248.154.57 port 43608 Jan 12 23:06:45 motanud sshd\[17336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.248.154.57 Jan 12 23:06:47 motanud sshd\[17336\]: Failed password for invalid user teste from 50.248.154.57 port 43608 ssh2 |
2019-08-11 12:14:40 |
177.128.143.240 | attack | failed_logins |
2019-08-11 12:35:01 |
23.129.64.212 | attack | Aug 10 20:29:16 borg sshd[32796]: Failed unknown for invalid user administrator from 23.129.64.212 port 13483 ssh2 Aug 10 20:29:16 borg sshd[32796]: error: PAM: Authentication error for illegal user administrator from 23.129.64.212 Aug 10 20:29:16 borg sshd[32796]: Failed keyboard-interactive/pam for invalid user administrator from 23.129.64.212 port 13483 ssh2 ... |
2019-08-11 12:08:57 |
203.168.60.7 | attack | Aug 11 00:12:24 myhostname sshd[30477]: Invalid user apple1 from 203.168.60.7 Aug 11 00:12:24 myhostname sshd[30477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.168.60.7 Aug 11 00:12:26 myhostname sshd[30477]: Failed password for invalid user apple1 from 203.168.60.7 port 55808 ssh2 Aug 11 00:12:27 myhostname sshd[30477]: Received disconnect from 203.168.60.7 port 55808:11: Bye Bye [preauth] Aug 11 00:12:27 myhostname sshd[30477]: Disconnected from 203.168.60.7 port 55808 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=203.168.60.7 |
2019-08-11 12:37:34 |
51.9.222.89 | attackspam | Automatic report - Port Scan Attack |
2019-08-11 12:25:12 |