City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.148.89.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.148.89.98. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 16:06:53 CST 2025
;; MSG SIZE rcvd: 105
98.89.148.41.in-addr.arpa domain name pointer 8ta-148-89-98.telkomadsl.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
98.89.148.41.in-addr.arpa name = 8ta-148-89-98.telkomadsl.co.za.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 191.240.116.87 | attack | failed_logins |
2020-09-09 05:46:47 |
| 72.68.122.216 | attackspambots | Lines containing failures of 72.68.122.216 Sep 8 13:19:07 newdogma sshd[1409]: Invalid user pi from 72.68.122.216 port 43680 Sep 8 13:19:07 newdogma sshd[1409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.68.122.216 Sep 8 13:19:07 newdogma sshd[1405]: Invalid user pi from 72.68.122.216 port 43674 Sep 8 13:19:07 newdogma sshd[1405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.68.122.216 Sep 8 13:19:09 newdogma sshd[1409]: Failed password for invalid user pi from 72.68.122.216 port 43680 ssh2 Sep 8 13:19:09 newdogma sshd[1405]: Failed password for invalid user pi from 72.68.122.216 port 43674 ssh2 Sep 8 13:19:09 newdogma sshd[1409]: Connection closed by invalid user pi 72.68.122.216 port 43680 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=72.68.122.216 |
2020-09-09 05:12:25 |
| 106.13.82.231 | attackspambots | Sep 8 18:41:32 ns382633 sshd\[11941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.231 user=root Sep 8 18:41:35 ns382633 sshd\[11941\]: Failed password for root from 106.13.82.231 port 41728 ssh2 Sep 8 18:53:48 ns382633 sshd\[13791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.231 user=root Sep 8 18:53:50 ns382633 sshd\[13791\]: Failed password for root from 106.13.82.231 port 38410 ssh2 Sep 8 18:57:14 ns382633 sshd\[14529\]: Invalid user speech-dispatcher from 106.13.82.231 port 50944 Sep 8 18:57:14 ns382633 sshd\[14529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.231 |
2020-09-09 05:08:10 |
| 121.52.154.36 | attack | Sep 8 20:01:24 srv-ubuntu-dev3 sshd[50022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36 user=root Sep 8 20:01:26 srv-ubuntu-dev3 sshd[50022]: Failed password for root from 121.52.154.36 port 38696 ssh2 Sep 8 20:04:44 srv-ubuntu-dev3 sshd[50378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36 user=root Sep 8 20:04:46 srv-ubuntu-dev3 sshd[50378]: Failed password for root from 121.52.154.36 port 51568 ssh2 Sep 8 20:08:10 srv-ubuntu-dev3 sshd[50747]: Invalid user ubnt from 121.52.154.36 Sep 8 20:08:10 srv-ubuntu-dev3 sshd[50747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.52.154.36 Sep 8 20:08:10 srv-ubuntu-dev3 sshd[50747]: Invalid user ubnt from 121.52.154.36 Sep 8 20:08:12 srv-ubuntu-dev3 sshd[50747]: Failed password for invalid user ubnt from 121.52.154.36 port 36208 ssh2 Sep 8 20:11:25 srv-ubuntu-dev3 sshd[51210]: ... |
2020-09-09 05:20:03 |
| 177.23.58.23 | attackspam | Sep 8 23:11:40 vps639187 sshd\[22345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.58.23 user=root Sep 8 23:11:43 vps639187 sshd\[22345\]: Failed password for root from 177.23.58.23 port 37054 ssh2 Sep 8 23:15:45 vps639187 sshd\[22375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.58.23 user=root ... |
2020-09-09 05:34:24 |
| 222.186.15.115 | attack | Sep 8 23:34:29 santamaria sshd\[4191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root Sep 8 23:34:30 santamaria sshd\[4191\]: Failed password for root from 222.186.15.115 port 22376 ssh2 Sep 8 23:34:37 santamaria sshd\[4194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root ... |
2020-09-09 05:40:40 |
| 190.85.163.46 | attack | Sep 8 16:54:31 ws26vmsma01 sshd[62783]: Failed password for root from 190.85.163.46 port 54626 ssh2 ... |
2020-09-09 05:31:48 |
| 222.186.173.142 | attack | Failed password for invalid user from 222.186.173.142 port 8360 ssh2 |
2020-09-09 05:18:35 |
| 58.33.35.82 | attackbots | $f2bV_matches |
2020-09-09 05:45:21 |
| 63.82.55.144 | attack | Sep 8 18:42:14 web01 postfix/smtpd[368]: connect from cap.bmglondon.com[63.82.55.144] Sep 8 18:42:14 web01 policyd-spf[1436]: None; identhostnamey=helo; client-ip=63.82.55.144; helo=cap.bmglondon.com; envelope-from=x@x Sep 8 18:42:14 web01 policyd-spf[1436]: Pass; identhostnamey=mailfrom; client-ip=63.82.55.144; helo=cap.bmglondon.com; envelope-from=x@x Sep x@x Sep 8 18:42:14 web01 postfix/smtpd[368]: disconnect from cap.bmglondon.com[63.82.55.144] Sep 8 18:46:06 web01 postfix/smtpd[368]: connect from cap.bmglondon.com[63.82.55.144] Sep 8 18:46:06 web01 policyd-spf[2454]: None; identhostnamey=helo; client-ip=63.82.55.144; helo=cap.bmglondon.com; envelope-from=x@x Sep 8 18:46:06 web01 policyd-spf[2454]: Pass; identhostnamey=mailfrom; client-ip=63.82.55.144; helo=cap.bmglondon.com; envelope-from=x@x Sep x@x Sep 8 18:46:06 web01 postfix/smtpd[368]: disconnect from cap.bmglondon.com[63.82.55.144] Sep 8 18:46:18 web01 postfix/smtpd[368]: connect from cap.bmglondon.c........ ------------------------------- |
2020-09-09 05:19:41 |
| 201.182.180.31 | attack | Sep 8 23:54:20 gw1 sshd[29906]: Failed password for root from 201.182.180.31 port 45016 ssh2 Sep 8 23:58:56 gw1 sshd[29953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.180.31 ... |
2020-09-09 05:49:04 |
| 20.37.99.237 | attack | Sep 2 00:39:01 web01.agentur-b-2.de postfix/smtps/smtpd[2337568]: warning: unknown[20.37.99.237]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 2 00:41:13 web01.agentur-b-2.de postfix/smtps/smtpd[2339156]: warning: unknown[20.37.99.237]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 2 00:43:23 web01.agentur-b-2.de postfix/smtps/smtpd[2339501]: warning: unknown[20.37.99.237]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 2 00:45:32 web01.agentur-b-2.de postfix/smtps/smtpd[2339851]: warning: unknown[20.37.99.237]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 2 00:47:42 web01.agentur-b-2.de postfix/smtps/smtpd[2340025]: warning: unknown[20.37.99.237]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-09-09 05:21:17 |
| 45.232.93.69 | attackbotsspam | Attempts against non-existent wp-login |
2020-09-09 05:38:12 |
| 91.90.36.174 | attackspambots | Sep 08 13:23:48 askasleikir sshd[109588]: Failed password for invalid user tchang from 91.90.36.174 port 48658 ssh2 |
2020-09-09 05:08:34 |
| 45.143.222.131 | attackbots | Email address rejected |
2020-09-09 05:15:57 |