City: Johannesburg
Region: Gauteng
Country: South Africa
Internet Service Provider: Vodacom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.26.57.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61008
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.26.57.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 14:57:08 CST 2025
;; MSG SIZE rcvd: 105
242.57.26.41.in-addr.arpa domain name pointer vc-gp-s-41-26-57-242.umts.vodacom.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.57.26.41.in-addr.arpa name = vc-gp-s-41-26-57-242.umts.vodacom.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
139.59.2.184 | attackspambots | 2020-06-01T18:20[Censored Hostname] sshd[12536]: Failed password for root from 139.59.2.184 port 58634 ssh2 2020-06-01T18:22[Censored Hostname] sshd[13171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.2.184 user=root 2020-06-01T18:22[Censored Hostname] sshd[13171]: Failed password for root from 139.59.2.184 port 58078 ssh2[...] |
2020-06-02 01:19:05 |
175.125.95.160 | attackbotsspam | Jun 1 08:27:01 lanister sshd[23865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.125.95.160 user=root Jun 1 08:27:02 lanister sshd[23865]: Failed password for root from 175.125.95.160 port 59518 ssh2 Jun 1 08:31:12 lanister sshd[23884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.125.95.160 user=root Jun 1 08:31:13 lanister sshd[23884]: Failed password for root from 175.125.95.160 port 36306 ssh2 |
2020-06-02 01:24:23 |
34.93.211.49 | attack | 2020-06-01T16:42:25.695478shield sshd\[16843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.211.93.34.bc.googleusercontent.com user=root 2020-06-01T16:42:27.268904shield sshd\[16843\]: Failed password for root from 34.93.211.49 port 39638 ssh2 2020-06-01T16:46:12.192681shield sshd\[17525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.211.93.34.bc.googleusercontent.com user=root 2020-06-01T16:46:14.592060shield sshd\[17525\]: Failed password for root from 34.93.211.49 port 34426 ssh2 2020-06-01T16:49:56.966084shield sshd\[18312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.211.93.34.bc.googleusercontent.com user=root |
2020-06-02 00:56:41 |
134.209.148.107 | attackbotsspam | " " |
2020-06-02 01:37:48 |
109.24.144.69 | attack | Jun 1 12:52:10 ny01 sshd[19210]: Failed password for root from 109.24.144.69 port 33840 ssh2 Jun 1 12:55:32 ny01 sshd[20022]: Failed password for root from 109.24.144.69 port 37494 ssh2 |
2020-06-02 01:14:06 |
180.76.176.126 | attackspam | Jun 1 11:09:24 serwer sshd\[29962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126 user=root Jun 1 11:09:26 serwer sshd\[29962\]: Failed password for root from 180.76.176.126 port 37426 ssh2 Jun 1 11:14:39 serwer sshd\[30692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126 user=root Jun 1 11:14:41 serwer sshd\[30692\]: Failed password for root from 180.76.176.126 port 58608 ssh2 Jun 1 11:19:37 serwer sshd\[31261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126 user=root Jun 1 11:19:39 serwer sshd\[31261\]: Failed password for root from 180.76.176.126 port 44094 ssh2 Jun 1 11:22:16 serwer sshd\[31677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126 user=root Jun 1 11:22:17 serwer sshd\[31677\]: Failed password for root from 180.76.176.126 ... |
2020-06-02 01:17:20 |
195.158.26.238 | attackbots | Jun 1 18:53:51 server sshd[1762]: Failed password for root from 195.158.26.238 port 40680 ssh2 Jun 1 18:58:03 server sshd[6043]: Failed password for root from 195.158.26.238 port 45662 ssh2 Jun 1 19:01:56 server sshd[10117]: Failed password for root from 195.158.26.238 port 50656 ssh2 |
2020-06-02 01:05:49 |
193.112.216.235 | attackbots | Jun 1 15:54:02 vps647732 sshd[25732]: Failed password for root from 193.112.216.235 port 52772 ssh2 ... |
2020-06-02 01:38:24 |
103.74.72.140 | attack | 1591013133 - 06/01/2020 14:05:33 Host: 103.74.72.140/103.74.72.140 Port: 445 TCP Blocked |
2020-06-02 00:58:13 |
188.166.80.38 | attackbotsspam | Scanning for exploits - /wp-includes/wlwmanifest.xml |
2020-06-02 01:18:34 |
14.116.200.226 | attackbotsspam | 2020-06-01 07:03:28.127942-0500 localhost sshd[60746]: Failed password for root from 14.116.200.226 port 26107 ssh2 |
2020-06-02 01:31:25 |
185.234.216.64 | attackbots | 2020-06-01 dovecot_login authenticator failed for \(**REMOVED**\) \[185.234.216.64\]: 535 Incorrect authentication data \(set_id=standard\) 2020-06-01 dovecot_login authenticator failed for \(**REMOVED**\) \[185.234.216.64\]: 535 Incorrect authentication data \(set_id=stats\) 2020-06-01 dovecot_login authenticator failed for \(**REMOVED**\) \[185.234.216.64\]: 535 Incorrect authentication data \(set_id=susan\) |
2020-06-02 01:29:27 |
45.134.179.57 | attackspam | Jun 1 19:06:32 debian-2gb-nbg1-2 kernel: \[13289962.981795\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=59213 PROTO=TCP SPT=42985 DPT=6596 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-02 01:12:05 |
106.13.19.178 | attack | Jun 1 15:49:14 ns381471 sshd[7109]: Failed password for root from 106.13.19.178 port 37642 ssh2 |
2020-06-02 01:38:09 |
223.56.16.11 | attackbots | Email Spoofing |
2020-06-02 01:23:50 |