City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.147.121.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55433
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.147.121.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 09:14:19 CST 2025
;; MSG SIZE rcvd: 106
54.121.147.41.in-addr.arpa domain name pointer 8ta-147-121-54.telkomadsl.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.121.147.41.in-addr.arpa name = 8ta-147-121-54.telkomadsl.co.za.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.51.248.76 | attack | Jul 17 15:02:03 ws22vmsma01 sshd[22861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.248.76 Jul 17 15:02:04 ws22vmsma01 sshd[22861]: Failed password for invalid user brainy from 122.51.248.76 port 49382 ssh2 ... |
2020-07-18 04:08:15 |
| 93.39.116.254 | attackbots | Fail2Ban Ban Triggered |
2020-07-18 04:39:19 |
| 115.133.51.46 | attackbotsspam | DATE:2020-07-17 14:08:08, IP:115.133.51.46, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2020-07-18 04:02:03 |
| 35.229.138.243 | attack | 35.229.138.243 - - [17/Jul/2020:21:18:09 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 35.229.138.243 - - [17/Jul/2020:21:30:16 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-18 04:10:52 |
| 116.90.165.26 | attack | Jul 17 21:34:05 vps647732 sshd[15146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.90.165.26 Jul 17 21:34:07 vps647732 sshd[15146]: Failed password for invalid user hash from 116.90.165.26 port 55340 ssh2 ... |
2020-07-18 04:13:30 |
| 206.189.198.237 | attack | [ssh] SSH attack |
2020-07-18 04:32:17 |
| 161.35.4.190 | attackspam | [ssh] SSH attack |
2020-07-18 04:09:00 |
| 220.134.194.121 | attackbotsspam | Honeypot attack, port: 81, PTR: 220-134-194-121.HINET-IP.hinet.net. |
2020-07-18 04:40:32 |
| 49.149.97.78 | attackbots | 1594987659 - 07/17/2020 14:07:39 Host: 49.149.97.78/49.149.97.78 Port: 445 TCP Blocked |
2020-07-18 04:24:10 |
| 74.204.105.102 | attack | Brute forcing email accounts |
2020-07-18 04:20:44 |
| 140.246.224.162 | attackbotsspam | Invalid user wkz from 140.246.224.162 port 48700 |
2020-07-18 04:21:45 |
| 77.89.6.161 | attackspambots | Mailserver and mailaccount attacks |
2020-07-18 04:13:54 |
| 61.177.172.41 | attack | Jul 17 22:09:14 abendstille sshd\[29194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41 user=root Jul 17 22:09:16 abendstille sshd\[29194\]: Failed password for root from 61.177.172.41 port 21381 ssh2 Jul 17 22:09:17 abendstille sshd\[29208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41 user=root Jul 17 22:09:19 abendstille sshd\[29208\]: Failed password for root from 61.177.172.41 port 15503 ssh2 Jul 17 22:09:19 abendstille sshd\[29194\]: Failed password for root from 61.177.172.41 port 21381 ssh2 ... |
2020-07-18 04:19:13 |
| 49.233.83.218 | attackbotsspam | $f2bV_matches |
2020-07-18 04:08:37 |
| 152.136.101.207 | attackbots | Jul 17 22:34:15 vps647732 sshd[16615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.101.207 Jul 17 22:34:17 vps647732 sshd[16615]: Failed password for invalid user xcc from 152.136.101.207 port 36722 ssh2 ... |
2020-07-18 04:35:33 |