City: unknown
Region: unknown
Country: Libya
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.252.95.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.252.95.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 01:19:55 CST 2025
;; MSG SIZE rcvd: 106
149.95.252.41.in-addr.arpa domain name pointer 41.252.95.149.ADSL.ZS2.dynamic.ltt.ly.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.95.252.41.in-addr.arpa name = 41.252.95.149.ADSL.ZS2.dynamic.ltt.ly.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.42.155 | attackbotsspam | Oct 5 16:43:07 email sshd\[8126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155 user=root Oct 5 16:43:09 email sshd\[8126\]: Failed password for root from 222.186.42.155 port 32932 ssh2 Oct 5 16:44:02 email sshd\[8299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155 user=root Oct 5 16:44:03 email sshd\[8299\]: Failed password for root from 222.186.42.155 port 22534 ssh2 Oct 5 16:44:28 email sshd\[8361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155 user=root ... |
2020-10-06 00:50:30 |
| 170.81.59.37 | attackspam | $f2bV_matches |
2020-10-06 01:02:39 |
| 106.13.68.190 | attackspambots | Oct 5 15:02:32 OPSO sshd\[6404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.68.190 user=root Oct 5 15:02:35 OPSO sshd\[6404\]: Failed password for root from 106.13.68.190 port 58054 ssh2 Oct 5 15:06:48 OPSO sshd\[7208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.68.190 user=root Oct 5 15:06:50 OPSO sshd\[7208\]: Failed password for root from 106.13.68.190 port 47736 ssh2 Oct 5 15:11:07 OPSO sshd\[7913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.68.190 user=root |
2020-10-06 00:47:30 |
| 128.199.181.27 | attackspam | (sshd) Failed SSH login from 128.199.181.27 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 5 04:47:41 jbs1 sshd[23095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.181.27 user=root Oct 5 04:47:43 jbs1 sshd[23095]: Failed password for root from 128.199.181.27 port 10344 ssh2 Oct 5 04:52:52 jbs1 sshd[24696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.181.27 user=root Oct 5 04:52:54 jbs1 sshd[24696]: Failed password for root from 128.199.181.27 port 3959 ssh2 Oct 5 04:57:41 jbs1 sshd[26101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.181.27 user=root |
2020-10-06 01:12:49 |
| 193.112.213.248 | attackbotsspam | Oct 5 12:17:14 rotator sshd\[29726\]: Failed password for root from 193.112.213.248 port 35796 ssh2Oct 5 12:18:43 rotator sshd\[29767\]: Failed password for root from 193.112.213.248 port 52742 ssh2Oct 5 12:20:20 rotator sshd\[30456\]: Failed password for root from 193.112.213.248 port 41460 ssh2Oct 5 12:21:58 rotator sshd\[30567\]: Failed password for root from 193.112.213.248 port 58420 ssh2Oct 5 12:23:31 rotator sshd\[30595\]: Failed password for root from 193.112.213.248 port 47132 ssh2Oct 5 12:25:01 rotator sshd\[30615\]: Failed password for root from 193.112.213.248 port 35850 ssh2 ... |
2020-10-06 00:55:01 |
| 157.230.240.140 | attackbotsspam | [N1.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-10-06 00:33:37 |
| 220.161.81.131 | attackbotsspam | Oct 5 07:38:09 abendstille sshd\[28689\]: Invalid user fake from 220.161.81.131 Oct 5 07:38:09 abendstille sshd\[28689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131 Oct 5 07:38:10 abendstille sshd\[28689\]: Failed password for invalid user fake from 220.161.81.131 port 34864 ssh2 Oct 5 07:45:31 abendstille sshd\[3113\]: Invalid user Orange from 220.161.81.131 Oct 5 07:45:31 abendstille sshd\[3113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131 ... |
2020-10-06 00:59:16 |
| 66.249.64.157 | attack | Automatic report - Banned IP Access |
2020-10-06 01:05:24 |
| 180.250.247.45 | attackspambots | Oct 5 17:50:23 nextcloud sshd\[21628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45 user=root Oct 5 17:50:25 nextcloud sshd\[21628\]: Failed password for root from 180.250.247.45 port 51978 ssh2 Oct 5 17:54:38 nextcloud sshd\[27000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45 user=root |
2020-10-06 00:49:18 |
| 128.199.120.132 | attack | 2020-10-05T16:04:33.834650abusebot-5.cloudsearch.cf sshd[10790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.120.132 user=root 2020-10-05T16:04:35.591860abusebot-5.cloudsearch.cf sshd[10790]: Failed password for root from 128.199.120.132 port 51682 ssh2 2020-10-05T16:07:39.748102abusebot-5.cloudsearch.cf sshd[10814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.120.132 user=root 2020-10-05T16:07:41.370322abusebot-5.cloudsearch.cf sshd[10814]: Failed password for root from 128.199.120.132 port 41724 ssh2 2020-10-05T16:10:47.750847abusebot-5.cloudsearch.cf sshd[10848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.120.132 user=root 2020-10-05T16:10:49.182200abusebot-5.cloudsearch.cf sshd[10848]: Failed password for root from 128.199.120.132 port 60002 ssh2 2020-10-05T16:14:00.998623abusebot-5.cloudsearch.cf sshd[10921]: pam_unix(sshd: ... |
2020-10-06 01:08:26 |
| 1.186.248.30 | attackspambots | $f2bV_matches |
2020-10-06 00:45:44 |
| 45.143.221.3 | attackspambots | Fail2Ban Ban Triggered |
2020-10-06 01:06:12 |
| 49.235.75.158 | attackspambots | Oct 4 23:33:59 ift sshd\[40463\]: Failed password for root from 49.235.75.158 port 43382 ssh2Oct 4 23:34:48 ift sshd\[40599\]: Failed password for root from 49.235.75.158 port 51604 ssh2Oct 4 23:35:37 ift sshd\[40935\]: Failed password for root from 49.235.75.158 port 59828 ssh2Oct 4 23:36:23 ift sshd\[41041\]: Failed password for root from 49.235.75.158 port 39818 ssh2Oct 4 23:37:10 ift sshd\[41208\]: Failed password for root from 49.235.75.158 port 48036 ssh2 ... |
2020-10-06 01:05:50 |
| 78.128.113.121 | attackspam | 2020-10-05 18:24:24 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data \(set_id=info@yt.gl\) 2020-10-05 18:24:31 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data 2020-10-05 18:24:39 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data 2020-10-05 18:24:44 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data 2020-10-05 18:24:55 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data 2020-10-05 18:25:00 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect authentication data 2020-10-05 18:25:05 dovecot_login authenticator failed for \(ip-113-121.4vendeta.com.\) \[78.128.113.121\]: 535 Incorrect auth ... |
2020-10-06 01:05:01 |
| 198.199.65.166 | attackspam | Oct 5 17:35:30 server sshd[12986]: Failed password for root from 198.199.65.166 port 51274 ssh2 Oct 5 17:37:50 server sshd[14256]: Failed password for root from 198.199.65.166 port 57174 ssh2 Oct 5 17:40:08 server sshd[15704]: Failed password for root from 198.199.65.166 port 34842 ssh2 |
2020-10-06 00:26:45 |