City: Kempton Park
Region: Gauteng
Country: South Africa
Internet Service Provider: Telkom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.145.86.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6835
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.145.86.151. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019091001 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Sep 11 02:00:10 CST 2019
;; MSG SIZE rcvd: 117
151.86.145.41.in-addr.arpa domain name pointer 8ta-145-86-151.telkomadsl.co.za.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
151.86.145.41.in-addr.arpa name = 8ta-145-86-151.telkomadsl.co.za.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 61.80.89.108 | attackspam | TCP Port Scanning |
2019-11-02 14:16:31 |
| 103.133.110.77 | attack | Postfix DNSBL listed. Trying to send SPAM. |
2019-11-02 14:11:17 |
| 89.141.153.116 | attack | Automatic report - Web App Attack |
2019-11-02 14:03:53 |
| 222.186.42.4 | attack | Nov 2 08:25:45 server sshd\[17229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4 user=root Nov 2 08:25:47 server sshd\[17229\]: Failed password for root from 222.186.42.4 port 13154 ssh2 Nov 2 08:25:47 server sshd\[17242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4 user=root Nov 2 08:25:48 server sshd\[17246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4 user=root Nov 2 08:25:49 server sshd\[17242\]: Failed password for root from 222.186.42.4 port 42758 ssh2 ... |
2019-11-02 13:30:03 |
| 222.186.175.220 | attackspambots | Nov 2 02:17:16 xentho sshd[5751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220 user=root Nov 2 02:17:17 xentho sshd[5751]: Failed password for root from 222.186.175.220 port 48814 ssh2 Nov 2 02:17:22 xentho sshd[5751]: Failed password for root from 222.186.175.220 port 48814 ssh2 Nov 2 02:17:16 xentho sshd[5751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220 user=root Nov 2 02:17:17 xentho sshd[5751]: Failed password for root from 222.186.175.220 port 48814 ssh2 Nov 2 02:17:22 xentho sshd[5751]: Failed password for root from 222.186.175.220 port 48814 ssh2 Nov 2 02:17:16 xentho sshd[5751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220 user=root Nov 2 02:17:17 xentho sshd[5751]: Failed password for root from 222.186.175.220 port 48814 ssh2 Nov 2 02:17:22 xentho sshd[5751]: Failed password for root from ... |
2019-11-02 14:19:21 |
| 117.94.218.211 | attackspam | Lines containing failures of 117.94.218.211 Nov 2 04:13:54 *** sshd[74751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.94.218.211 user=r.r Nov 2 04:13:55 *** sshd[74751]: Failed password for r.r from 117.94.218.211 port 1486 ssh2 Nov 2 04:14:01 *** sshd[74751]: message repeated 3 serveres: [ Failed password for r.r from 117.94.218.211 port 1486 ssh2] Nov 2 04:14:03 *** sshd[74751]: Failed password for r.r from 117.94.218.211 port 1486 ssh2 Nov 2 04:14:03 *** sshd[74751]: Connection reset by authenticating user r.r 117.94.218.211 port 1486 [preauth] Nov 2 04:14:03 *** sshd[74751]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.94.218.211 user=r.r Nov 2 04:14:05 *** sshd[74760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.94.218.211 user=r.r Nov 2 04:14:06 *** sshd[74760]: Failed password for r.r from 117.94.218.211 port 2305 ssh2 ........ ------------------------------ |
2019-11-02 13:58:36 |
| 93.157.63.60 | attackbots | Lines containing failures of 93.157.63.60 Nov 2 03:26:31 expertgeeks postfix/smtpd[22256]: connect from dfg.londonmarketwatch.com[93.157.63.60] Nov 2 03:26:31 expertgeeks postfix/smtpd[22256]: Anonymous TLS connection established from dfg.londonmarketwatch.com[93.157.63.60]: TLSv1 whostnameh cipher ECDHE-RSA-AES256-SHA (256/256 bhostnames) Nov x@x Nov 2 03:26:32 expertgeeks postfix/smtpd[22256]: disconnect from dfg.londonmarketwatch.com[93.157.63.60] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 commands=5/6 Nov 2 03:37:21 expertgeeks postfix/smtpd[23321]: connect from dfg.londonmarketwatch.com[93.157.63.60] Nov 2 03:37:21 expertgeeks postfix/smtpd[23321]: Anonymous TLS connection established from dfg.londonmarketwatch.com[93.157.63.60]: TLSv1 whostnameh cipher ECDHE-RSA-AES256-SHA (256/256 bhostnames) Nov x@x Nov 2 03:37:22 expertgeeks postfix/smtpd[23321]: disconnect from dfg.londonmarketwatch.com[93.157.63.60] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 comm........ ------------------------------ |
2019-11-02 14:06:42 |
| 174.138.0.164 | attack | WordPress wp-login brute force :: 174.138.0.164 0.084 BYPASS [02/Nov/2019:03:52:32 0000] www.[censored_4] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-11-02 14:01:51 |
| 168.197.5.169 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/168.197.5.169/ BR - 1H : (391) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN262550 IP : 168.197.5.169 CIDR : 168.197.4.0/23 PREFIX COUNT : 7 UNIQUE IP COUNT : 4096 ATTACKS DETECTED ASN262550 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-11-02 04:52:53 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-11-02 13:51:01 |
| 206.189.129.38 | attackspam | Nov 1 00:49:36 xm3 sshd[10442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.129.38 user=r.r Nov 1 00:49:37 xm3 sshd[10442]: Failed password for r.r from 206.189.129.38 port 38548 ssh2 Nov 1 00:49:38 xm3 sshd[10442]: Received disconnect from 206.189.129.38: 11: Bye Bye [preauth] Nov 1 01:04:43 xm3 sshd[13655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.129.38 user=r.r Nov 1 01:04:45 xm3 sshd[13655]: Failed password for r.r from 206.189.129.38 port 46286 ssh2 Nov 1 01:04:45 xm3 sshd[13655]: Received disconnect from 206.189.129.38: 11: Bye Bye [preauth] Nov 1 01:09:07 xm3 sshd[23124]: Failed password for invalid user user1 from 206.189.129.38 port 59326 ssh2 Nov 1 01:09:07 xm3 sshd[23124]: Received disconnect from 206.189.129.38: 11: Bye Bye [preauth] Nov 1 01:13:20 xm3 sshd[32741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ru........ ------------------------------- |
2019-11-02 13:27:50 |
| 223.71.139.97 | attackspambots | 2019-11-02T06:04:37.163368abusebot-5.cloudsearch.cf sshd\[20894\]: Invalid user khwanjung from 223.71.139.97 port 54254 |
2019-11-02 14:17:14 |
| 91.248.125.251 | attackbotsspam | TCP Port Scanning |
2019-11-02 14:09:46 |
| 218.92.0.135 | attackspam | Nov 2 04:52:10 arianus sshd\[17912\]: Unable to negotiate with 218.92.0.135 port 56605: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\] ... |
2019-11-02 14:19:48 |
| 112.85.42.237 | attackspambots | SSH Brute Force, server-1 sshd[12331]: Failed password for root from 112.85.42.237 port 11188 ssh2 |
2019-11-02 13:49:36 |
| 139.199.158.14 | attackbots | Nov 2 05:25:08 vps647732 sshd[32230]: Failed password for root from 139.199.158.14 port 39211 ssh2 Nov 2 05:29:32 vps647732 sshd[32301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.158.14 ... |
2019-11-02 13:29:23 |