City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: MTN
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.125.158.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.125.158.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:09:07 CST 2025
;; MSG SIZE rcvd: 107
Host 139.158.125.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.158.125.41.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 177.184.133.41 | attackspambots | Jul 30 07:56:03 server sshd\[1112\]: Invalid user tom from 177.184.133.41 port 52047 Jul 30 07:56:03 server sshd\[1112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.184.133.41 Jul 30 07:56:06 server sshd\[1112\]: Failed password for invalid user tom from 177.184.133.41 port 52047 ssh2 Jul 30 08:01:50 server sshd\[20351\]: Invalid user inma from 177.184.133.41 port 50538 Jul 30 08:01:50 server sshd\[20351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.184.133.41 |
2019-07-30 13:02:37 |
| 217.218.190.236 | attackspambots | 445/tcp 445/tcp 445/tcp... [2019-06-11/07-29]5pkt,1pt.(tcp) |
2019-07-30 13:42:23 |
| 191.53.59.16 | attackspambots | Brute force SMTP login attempts. |
2019-07-30 13:49:43 |
| 162.243.149.6 | attackspam | *Port Scan* detected from 162.243.149.6 (US/United States/zg-0403-19.stretchoid.com). 4 hits in the last 245 seconds |
2019-07-30 13:24:01 |
| 45.161.80.178 | attackbotsspam | Many RDP login attempts detected by IDS script |
2019-07-30 13:51:41 |
| 128.199.201.104 | attackspambots | Jul 30 01:26:55 plusreed sshd[8027]: Invalid user 123456 from 128.199.201.104 ... |
2019-07-30 13:38:46 |
| 82.64.140.9 | attackbots | 22/tcp 22/tcp [2019-07-21/29]2pkt |
2019-07-30 13:22:18 |
| 168.128.13.252 | attackbots | 2019-07-30T04:33:26.636029abusebot-7.cloudsearch.cf sshd\[25307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-128-13-252-eu.mcp-services.net user=root |
2019-07-30 14:04:54 |
| 190.104.255.2 | attackbotsspam | 445/tcp 445/tcp 445/tcp... [2019-06-27/07-29]7pkt,1pt.(tcp) |
2019-07-30 14:02:34 |
| 14.221.165.79 | attack | Helo |
2019-07-30 13:19:21 |
| 82.165.129.60 | attackspam | fail2ban honeypot |
2019-07-30 13:50:58 |
| 65.188.145.176 | attackbotsspam | Unauthorised access (Jul 30) SRC=65.188.145.176 LEN=52 PREC=0x20 TTL=108 ID=21911 DF TCP DPT=445 WINDOW=8192 SYN |
2019-07-30 14:03:30 |
| 117.34.73.162 | attackbotsspam | Jul 30 05:36:05 mail sshd\[28661\]: Invalid user leon from 117.34.73.162\ Jul 30 05:36:07 mail sshd\[28661\]: Failed password for invalid user leon from 117.34.73.162 port 48882 ssh2\ Jul 30 05:39:03 mail sshd\[28721\]: Invalid user vg from 117.34.73.162\ Jul 30 05:39:05 mail sshd\[28721\]: Failed password for invalid user vg from 117.34.73.162 port 46930 ssh2\ Jul 30 05:42:03 mail sshd\[28728\]: Invalid user school from 117.34.73.162\ Jul 30 05:42:05 mail sshd\[28728\]: Failed password for invalid user school from 117.34.73.162 port 44916 ssh2\ |
2019-07-30 13:07:28 |
| 121.134.233.22 | attackbotsspam | Automatic report - SSH Brute-Force Attack |
2019-07-30 13:25:25 |
| 118.250.112.35 | attack | 2019-07-30 13:06:00 |