City: unknown
Region: unknown
Country: Ghana
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.139.4.90 | attackspambots | Aug 27 04:59:50 mail.srvfarm.net postfix/smtpd[1342033]: warning: unknown[41.139.4.90]: SASL PLAIN authentication failed: Aug 27 04:59:50 mail.srvfarm.net postfix/smtpd[1342033]: lost connection after AUTH from unknown[41.139.4.90] Aug 27 05:00:51 mail.srvfarm.net postfix/smtpd[1347722]: warning: unknown[41.139.4.90]: SASL PLAIN authentication failed: Aug 27 05:00:51 mail.srvfarm.net postfix/smtpd[1347722]: lost connection after AUTH from unknown[41.139.4.90] Aug 27 05:01:30 mail.srvfarm.net postfix/smtps/smtpd[1337554]: warning: unknown[41.139.4.90]: SASL PLAIN authentication failed: |
2020-08-28 08:42:48 |
| 41.139.4.49 | attackspambots | Aug 14 23:50:09 mail.srvfarm.net postfix/smtpd[736663]: warning: unknown[41.139.4.49]: SASL PLAIN authentication failed: Aug 14 23:50:09 mail.srvfarm.net postfix/smtpd[736663]: lost connection after AUTH from unknown[41.139.4.49] Aug 14 23:53:54 mail.srvfarm.net postfix/smtps/smtpd[734614]: warning: unknown[41.139.4.49]: SASL PLAIN authentication failed: Aug 14 23:53:54 mail.srvfarm.net postfix/smtps/smtpd[734614]: lost connection after AUTH from unknown[41.139.4.49] Aug 14 23:56:14 mail.srvfarm.net postfix/smtps/smtpd[737375]: warning: unknown[41.139.4.49]: SASL PLAIN authentication failed: |
2020-08-15 17:26:32 |
| 41.139.4.16 | attack | Aug 15 01:09:08 mail.srvfarm.net postfix/smtpd[910655]: warning: unknown[41.139.4.16]: SASL PLAIN authentication failed: Aug 15 01:09:08 mail.srvfarm.net postfix/smtpd[910655]: lost connection after AUTH from unknown[41.139.4.16] Aug 15 01:17:25 mail.srvfarm.net postfix/smtps/smtpd[927803]: warning: unknown[41.139.4.16]: SASL PLAIN authentication failed: Aug 15 01:17:25 mail.srvfarm.net postfix/smtps/smtpd[927803]: lost connection after AUTH from unknown[41.139.4.16] Aug 15 01:19:05 mail.srvfarm.net postfix/smtpd[929464]: warning: unknown[41.139.4.16]: SASL PLAIN authentication failed: |
2020-08-15 16:03:30 |
| 41.139.4.83 | attackspam | Aug 7 05:17:41 mail.srvfarm.net postfix/smtps/smtpd[3176100]: warning: unknown[41.139.4.83]: SASL PLAIN authentication failed: Aug 7 05:17:41 mail.srvfarm.net postfix/smtps/smtpd[3176100]: lost connection after AUTH from unknown[41.139.4.83] Aug 7 05:22:41 mail.srvfarm.net postfix/smtpd[3188840]: warning: unknown[41.139.4.83]: SASL PLAIN authentication failed: Aug 7 05:22:41 mail.srvfarm.net postfix/smtpd[3188840]: lost connection after AUTH from unknown[41.139.4.83] Aug 7 05:26:19 mail.srvfarm.net postfix/smtpd[3188836]: warning: unknown[41.139.4.83]: SASL PLAIN authentication failed: |
2020-08-07 17:05:27 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.139.4.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.139.4.45. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 14:10:36 CST 2022
;; MSG SIZE rcvd: 104
Host 45.4.139.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 45.4.139.41.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 43.249.192.47 | attackbotsspam | ssh failed login |
2019-07-18 09:52:38 |
| 90.188.253.143 | attack | IMAP brute force ... |
2019-07-18 09:51:49 |
| 165.22.75.206 | attackbots | Caught in portsentry honeypot |
2019-07-18 09:41:09 |
| 218.92.0.160 | attack | Jul 18 01:59:02 db sshd\[497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.160 user=root Jul 18 01:59:04 db sshd\[497\]: Failed password for root from 218.92.0.160 port 38670 ssh2 Jul 18 01:59:07 db sshd\[497\]: Failed password for root from 218.92.0.160 port 38670 ssh2 Jul 18 01:59:10 db sshd\[497\]: Failed password for root from 218.92.0.160 port 38670 ssh2 Jul 18 01:59:12 db sshd\[497\]: Failed password for root from 218.92.0.160 port 38670 ssh2 ... |
2019-07-18 09:35:49 |
| 144.217.97.217 | attackspambots | Unauthorised access (Jul 18) SRC=144.217.97.217 LEN=40 TOS=0x14 TTL=242 ID=32586 TCP DPT=445 WINDOW=1024 SYN |
2019-07-18 10:07:43 |
| 213.149.51.11 | attack | MagicSpam Rule: valid_helo_domain; Spammer IP: 213.149.51.11 |
2019-07-18 09:58:33 |
| 129.204.254.4 | attackbots | Jul 18 03:24:23 OPSO sshd\[26532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.254.4 user=root Jul 18 03:24:26 OPSO sshd\[26532\]: Failed password for root from 129.204.254.4 port 42472 ssh2 Jul 18 03:29:46 OPSO sshd\[27079\]: Invalid user thomas from 129.204.254.4 port 40078 Jul 18 03:29:46 OPSO sshd\[27079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.254.4 Jul 18 03:29:47 OPSO sshd\[27079\]: Failed password for invalid user thomas from 129.204.254.4 port 40078 ssh2 |
2019-07-18 09:44:38 |
| 37.10.112.93 | attackbots | 2019-07-17T22:47:39.980897abusebot.cloudsearch.cf sshd\[26767\]: Invalid user jsserver from 37.10.112.93 port 35088 |
2019-07-18 09:31:36 |
| 134.73.129.208 | attackbots | Jul 17 18:19:23 [munged] sshd[1127]: Invalid user shu from 134.73.129.208 port 51778 Jul 17 18:19:23 [munged] sshd[1127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.129.208 |
2019-07-18 09:22:38 |
| 181.52.172.134 | attackbotsspam | 2019-07-18T01:29:23.812783abusebot-6.cloudsearch.cf sshd\[8782\]: Invalid user store from 181.52.172.134 port 40036 |
2019-07-18 09:59:53 |
| 106.13.60.155 | attack | Automatic report - Banned IP Access |
2019-07-18 09:50:59 |
| 179.192.54.195 | attackspam | Jul 18 03:31:02 mout sshd[1547]: Invalid user sistema from 179.192.54.195 port 22881 |
2019-07-18 09:36:26 |
| 134.175.13.213 | attackbotsspam | Jul 18 04:29:27 srv-4 sshd\[22166\]: Invalid user zb from 134.175.13.213 Jul 18 04:29:27 srv-4 sshd\[22166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.13.213 Jul 18 04:29:29 srv-4 sshd\[22166\]: Failed password for invalid user zb from 134.175.13.213 port 54392 ssh2 ... |
2019-07-18 10:03:05 |
| 201.161.58.87 | attackbots | Jul 17 17:28:59 thevastnessof sshd[22566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.161.58.87 ... |
2019-07-18 09:26:27 |
| 71.16.217.158 | attackbots | firewall-block, port(s): 445/tcp |
2019-07-18 09:35:05 |