City: Johannesburg
Region: Gauteng
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.164.34.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.164.34.249. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:04:26 CST 2025
;; MSG SIZE rcvd: 106
Host 249.34.164.20.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 249.34.164.20.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
185.153.197.161 | attackspam | Dec 21 09:26:32 debian-2gb-nbg1-2 kernel: \[569549.981194\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.153.197.161 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=45065 PROTO=TCP SPT=46324 DPT=11119 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-12-21 16:49:10 |
78.139.200.51 | attackbots | [ER hit] Tried to deliver spam. Already well known. |
2019-12-21 16:40:18 |
106.13.98.119 | attackbots | Dec 21 07:54:56 jane sshd[29848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.119 Dec 21 07:54:58 jane sshd[29848]: Failed password for invalid user lapre from 106.13.98.119 port 34472 ssh2 ... |
2019-12-21 17:02:00 |
207.154.206.212 | attackbots | Dec 21 01:58:22 ny01 sshd[31327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212 Dec 21 01:58:25 ny01 sshd[31327]: Failed password for invalid user smmsp from 207.154.206.212 port 34842 ssh2 Dec 21 02:03:29 ny01 sshd[31844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212 |
2019-12-21 16:57:38 |
180.76.38.74 | attackspam | Dec 20 22:26:43 auw2 sshd\[11132\]: Invalid user farlin from 180.76.38.74 Dec 20 22:26:43 auw2 sshd\[11132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.38.74 Dec 20 22:26:45 auw2 sshd\[11132\]: Failed password for invalid user farlin from 180.76.38.74 port 48662 ssh2 Dec 20 22:34:35 auw2 sshd\[11870\]: Invalid user invitado from 180.76.38.74 Dec 20 22:34:35 auw2 sshd\[11870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.38.74 |
2019-12-21 16:48:34 |
179.25.32.5 | attackbotsspam | Automatic report - Port Scan Attack |
2019-12-21 16:59:01 |
27.254.130.69 | attack | Dec 21 10:10:58 ns381471 sshd[18409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.69 Dec 21 10:11:00 ns381471 sshd[18409]: Failed password for invalid user server from 27.254.130.69 port 58396 ssh2 |
2019-12-21 17:13:16 |
51.77.212.235 | attackspam | $f2bV_matches |
2019-12-21 17:06:04 |
68.183.31.138 | attack | Dec 21 13:46:35 gw1 sshd[20796]: Failed password for mysql from 68.183.31.138 port 59888 ssh2 Dec 21 13:52:49 gw1 sshd[21075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.31.138 ... |
2019-12-21 17:14:22 |
45.55.88.94 | attackspam | $f2bV_matches |
2019-12-21 16:39:07 |
222.186.173.215 | attackbots | Dec 21 10:09:20 vpn01 sshd[28436]: Failed password for root from 222.186.173.215 port 50968 ssh2 Dec 21 10:09:33 vpn01 sshd[28436]: error: maximum authentication attempts exceeded for root from 222.186.173.215 port 50968 ssh2 [preauth] ... |
2019-12-21 17:12:12 |
149.129.212.221 | attack | Dec 21 06:14:09 XXX sshd[57290]: Invalid user vision from 149.129.212.221 port 61219 |
2019-12-21 16:46:12 |
182.73.55.92 | attackbotsspam | Dec 21 06:49:04 localhost sshd\[103476\]: Invalid user ftp from 182.73.55.92 port 50920 Dec 21 06:49:04 localhost sshd\[103476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.55.92 Dec 21 06:49:06 localhost sshd\[103476\]: Failed password for invalid user ftp from 182.73.55.92 port 50920 ssh2 Dec 21 06:59:21 localhost sshd\[103716\]: Invalid user server from 182.73.55.92 port 56432 Dec 21 06:59:21 localhost sshd\[103716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.55.92 ... |
2019-12-21 16:50:38 |
159.65.4.64 | attack | sshd jail - ssh hack attempt |
2019-12-21 17:10:59 |
84.53.243.121 | attackspam | Unauthorized connection attempt detected from IP address 84.53.243.121 to port 445 |
2019-12-21 16:42:32 |