City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.164.195.204 | attack | (sshd) Failed SSH login from 41.164.195.204 (ZA/South Africa/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 13 00:09:52 ubnt-55d23 sshd[8787]: Invalid user forge from 41.164.195.204 port 39156 Apr 13 00:09:55 ubnt-55d23 sshd[8787]: Failed password for invalid user forge from 41.164.195.204 port 39156 ssh2 |
2020-04-13 06:50:40 |
| 41.164.195.204 | attackbotsspam | SSH Brute Force |
2020-04-11 18:33:12 |
| 41.164.195.204 | attack | Mar 26 01:31:36 Ubuntu-1404-trusty-64-minimal sshd\[6466\]: Invalid user wangjw from 41.164.195.204 Mar 26 01:31:36 Ubuntu-1404-trusty-64-minimal sshd\[6466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204 Mar 26 01:31:38 Ubuntu-1404-trusty-64-minimal sshd\[6466\]: Failed password for invalid user wangjw from 41.164.195.204 port 37444 ssh2 Mar 26 01:38:57 Ubuntu-1404-trusty-64-minimal sshd\[10876\]: Invalid user yocona from 41.164.195.204 Mar 26 01:38:57 Ubuntu-1404-trusty-64-minimal sshd\[10876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204 |
2020-03-26 10:11:01 |
| 41.164.118.136 | attack | Mar 20 13:44:30 ns382633 sshd\[26076\]: Invalid user zkb from 41.164.118.136 port 48550 Mar 20 13:44:30 ns382633 sshd\[26076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.118.136 Mar 20 13:44:32 ns382633 sshd\[26076\]: Failed password for invalid user zkb from 41.164.118.136 port 48550 ssh2 Mar 20 14:08:05 ns382633 sshd\[30443\]: Invalid user vpn from 41.164.118.136 port 46680 Mar 20 14:08:05 ns382633 sshd\[30443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.118.136 |
2020-03-21 03:21:57 |
| 41.164.118.136 | attack | Feb 22 14:38:01 localhost sshd\[23815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.118.136 user=root Feb 22 14:38:03 localhost sshd\[23815\]: Failed password for root from 41.164.118.136 port 44541 ssh2 Feb 22 14:42:39 localhost sshd\[24232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.118.136 user=root |
2020-02-22 21:50:31 |
| 41.164.118.136 | attack | Feb 20 04:51:58 web8 sshd\[29329\]: Invalid user postgres from 41.164.118.136 Feb 20 04:51:58 web8 sshd\[29329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.118.136 Feb 20 04:52:00 web8 sshd\[29329\]: Failed password for invalid user postgres from 41.164.118.136 port 55280 ssh2 Feb 20 04:54:17 web8 sshd\[30528\]: Invalid user web from 41.164.118.136 Feb 20 04:54:17 web8 sshd\[30528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.118.136 |
2020-02-20 15:57:31 |
| 41.164.195.204 | attack | Feb 13 20:58:40 web9 sshd\[3043\]: Invalid user elan1 from 41.164.195.204 Feb 13 20:58:40 web9 sshd\[3043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204 Feb 13 20:58:41 web9 sshd\[3043\]: Failed password for invalid user elan1 from 41.164.195.204 port 56806 ssh2 Feb 13 21:01:43 web9 sshd\[3463\]: Invalid user ryckebusch from 41.164.195.204 Feb 13 21:01:43 web9 sshd\[3463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204 |
2020-02-14 18:31:17 |
| 41.164.118.135 | attackspambots | Feb 10 00:19:48 master sshd[10088]: Failed password for invalid user lxr from 41.164.118.135 port 37524 ssh2 |
2020-02-10 07:54:51 |
| 41.164.195.204 | attack | Jan 27 17:36:44 pkdns2 sshd\[54175\]: Invalid user pi from 41.164.195.204Jan 27 17:36:47 pkdns2 sshd\[54175\]: Failed password for invalid user pi from 41.164.195.204 port 38768 ssh2Jan 27 17:40:11 pkdns2 sshd\[54409\]: Invalid user prueba from 41.164.195.204Jan 27 17:40:13 pkdns2 sshd\[54409\]: Failed password for invalid user prueba from 41.164.195.204 port 36118 ssh2Jan 27 17:43:26 pkdns2 sshd\[54588\]: Invalid user mqm from 41.164.195.204Jan 27 17:43:28 pkdns2 sshd\[54588\]: Failed password for invalid user mqm from 41.164.195.204 port 33452 ssh2 ... |
2020-01-28 00:16:46 |
| 41.164.169.106 | attackbots | spam |
2020-01-24 17:27:45 |
| 41.164.169.106 | attack | email spam |
2019-12-17 20:15:04 |
| 41.164.195.204 | attackbots | $f2bV_matches |
2019-12-01 06:15:47 |
| 41.164.195.204 | attackbots | Nov 25 00:15:43 lnxded63 sshd[21971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204 Nov 25 00:15:43 lnxded63 sshd[21971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204 Nov 25 00:15:45 lnxded63 sshd[21971]: Failed password for invalid user jct_acc from 41.164.195.204 port 38566 ssh2 |
2019-11-25 07:18:08 |
| 41.164.195.204 | attackbotsspam | (sshd) Failed SSH login from 41.164.195.204 (-): 5 in the last 3600 secs |
2019-11-25 04:48:18 |
| 41.164.169.106 | attackbots | Absender hat Spam-Falle ausgel?st |
2019-11-08 22:07:33 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.164.1.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.164.1.63. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 21:09:00 CST 2025
;; MSG SIZE rcvd: 104
Host 63.1.164.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 63.1.164.41.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 102.165.30.57 | attack |
|
2020-10-07 05:45:49 |
| 27.151.196.236 | attack | $f2bV_matches |
2020-10-07 06:15:16 |
| 112.29.170.59 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-06T20:51:38Z and 2020-10-06T21:00:37Z |
2020-10-07 05:45:04 |
| 141.98.9.35 | attackspambots | Triggered by Fail2Ban at Ares web server |
2020-10-07 06:07:00 |
| 113.142.58.155 | attackbots | $f2bV_matches |
2020-10-07 06:17:59 |
| 118.68.212.131 | attack | 20/10/5@21:22:43: FAIL: Alarm-Network address from=118.68.212.131 20/10/5@21:22:43: FAIL: Alarm-Network address from=118.68.212.131 ... |
2020-10-07 06:18:25 |
| 81.70.11.106 | attackbots | SSH Brute Force |
2020-10-07 06:12:18 |
| 141.98.9.36 | attackspam | Triggered by Fail2Ban at Ares web server |
2020-10-07 06:05:45 |
| 221.7.213.133 | attackbotsspam | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-10-07 05:51:51 |
| 141.98.9.31 | attack | Triggered by Fail2Ban at Ares web server |
2020-10-07 06:00:39 |
| 46.145.163.130 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2020-10-07 05:59:10 |
| 140.143.228.67 | attackbotsspam | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-10-07 05:49:33 |
| 112.85.42.47 | attackspambots | Oct 7 00:07:25 abendstille sshd\[22955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.47 user=root Oct 7 00:07:25 abendstille sshd\[22954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.47 user=root Oct 7 00:07:27 abendstille sshd\[22955\]: Failed password for root from 112.85.42.47 port 40684 ssh2 Oct 7 00:07:27 abendstille sshd\[22954\]: Failed password for root from 112.85.42.47 port 37218 ssh2 Oct 7 00:07:30 abendstille sshd\[22955\]: Failed password for root from 112.85.42.47 port 40684 ssh2 Oct 7 00:07:30 abendstille sshd\[22954\]: Failed password for root from 112.85.42.47 port 37218 ssh2 ... |
2020-10-07 06:10:14 |
| 35.238.78.110 | attackspam | HTTP backup/index.php - 110.78.238.35.bc.googleusercontent.com |
2020-10-07 06:18:54 |
| 212.112.126.85 | attackbots | Total attacks: 2 |
2020-10-07 05:52:36 |