City: unknown
Region: unknown
Country: Ghana
Internet Service Provider: Ghana Telecommunications Company Limited
Hostname: unknown
Organization: unknown
Usage Type: Mobile ISP
| Type | Details | Datetime |
|---|---|---|
| attack | SSH login attempts. |
2020-10-03 18:23:30 |
| attackspambots | Sep 12 17:05:05 ip-172-31-42-142 sshd\[10962\]: Failed password for root from 41.66.244.86 port 59812 ssh2\ Sep 12 17:08:19 ip-172-31-42-142 sshd\[10974\]: Invalid user amanda from 41.66.244.86\ Sep 12 17:08:21 ip-172-31-42-142 sshd\[10974\]: Failed password for invalid user amanda from 41.66.244.86 port 45570 ssh2\ Sep 12 17:11:38 ip-172-31-42-142 sshd\[11068\]: Failed password for root from 41.66.244.86 port 59470 ssh2\ Sep 12 17:14:49 ip-172-31-42-142 sshd\[11086\]: Invalid user exploit from 41.66.244.86\ |
2020-09-13 03:39:16 |
| attackbotsspam | Sep 12 13:32:57 * sshd[2867]: Failed password for root from 41.66.244.86 port 51632 ssh2 |
2020-09-12 19:47:33 |
| attack | Aug 24 07:49:00 vps647732 sshd[18753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Aug 24 07:49:02 vps647732 sshd[18753]: Failed password for invalid user asw from 41.66.244.86 port 40104 ssh2 ... |
2020-08-24 14:07:55 |
| attack | 2020-08-23T23:46:06.487899galaxy.wi.uni-potsdam.de sshd[31387]: Invalid user lfy from 41.66.244.86 port 36290 2020-08-23T23:46:06.492861galaxy.wi.uni-potsdam.de sshd[31387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 2020-08-23T23:46:06.487899galaxy.wi.uni-potsdam.de sshd[31387]: Invalid user lfy from 41.66.244.86 port 36290 2020-08-23T23:46:08.326150galaxy.wi.uni-potsdam.de sshd[31387]: Failed password for invalid user lfy from 41.66.244.86 port 36290 ssh2 2020-08-23T23:48:17.904743galaxy.wi.uni-potsdam.de sshd[31602]: Invalid user shift from 41.66.244.86 port 39524 2020-08-23T23:48:17.909830galaxy.wi.uni-potsdam.de sshd[31602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 2020-08-23T23:48:17.904743galaxy.wi.uni-potsdam.de sshd[31602]: Invalid user shift from 41.66.244.86 port 39524 2020-08-23T23:48:20.064234galaxy.wi.uni-potsdam.de sshd[31602]: Failed password for invalid ... |
2020-08-24 06:13:11 |
| attackspambots | Aug 23 05:56:36 IngegnereFirenze sshd[17931]: Failed password for invalid user engineering from 41.66.244.86 port 38408 ssh2 ... |
2020-08-23 14:03:19 |
| attackbots | Aug 22 16:46:03 myvps sshd[17588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Aug 22 16:46:05 myvps sshd[17588]: Failed password for invalid user ttest from 41.66.244.86 port 33670 ssh2 Aug 22 16:56:29 myvps sshd[23984]: Failed password for root from 41.66.244.86 port 40180 ssh2 ... |
2020-08-23 00:15:33 |
| attackspam | Aug 17 20:22:16 124388 sshd[9671]: Invalid user teste from 41.66.244.86 port 34948 Aug 17 20:22:16 124388 sshd[9671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Aug 17 20:22:16 124388 sshd[9671]: Invalid user teste from 41.66.244.86 port 34948 Aug 17 20:22:17 124388 sshd[9671]: Failed password for invalid user teste from 41.66.244.86 port 34948 ssh2 Aug 17 20:26:27 124388 sshd[9828]: Invalid user wget from 41.66.244.86 port 46870 |
2020-08-18 06:19:40 |
| attack | Aug 14 12:33:04 mockhub sshd[17315]: Failed password for root from 41.66.244.86 port 50544 ssh2 ... |
2020-08-15 03:46:04 |
| attackspam | Aug 11 00:06:58 journals sshd\[104858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 user=root Aug 11 00:07:00 journals sshd\[104858\]: Failed password for root from 41.66.244.86 port 41300 ssh2 Aug 11 00:11:31 journals sshd\[105163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 user=root Aug 11 00:11:33 journals sshd\[105163\]: Failed password for root from 41.66.244.86 port 55384 ssh2 Aug 11 00:16:11 journals sshd\[105407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 user=root ... |
2020-08-11 05:37:37 |
| attackspam | Invalid user yangxiangli from 41.66.244.86 port 48210 |
2020-07-28 14:49:23 |
| attackspambots | Jul 27 17:16:48 vmd36147 sshd[21321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Jul 27 17:16:50 vmd36147 sshd[21321]: Failed password for invalid user liuyang from 41.66.244.86 port 48956 ssh2 Jul 27 17:21:38 vmd36147 sshd[31969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 ... |
2020-07-27 23:41:21 |
| attackbotsspam | Jul 18 09:25:48 game-panel sshd[8102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Jul 18 09:25:50 game-panel sshd[8102]: Failed password for invalid user admin from 41.66.244.86 port 34038 ssh2 Jul 18 09:28:18 game-panel sshd[8226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 |
2020-07-18 18:13:41 |
| attackbotsspam | Jul 14 03:45:25 vlre-nyc-1 sshd\[11587\]: Invalid user git from 41.66.244.86 Jul 14 03:45:25 vlre-nyc-1 sshd\[11587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Jul 14 03:45:27 vlre-nyc-1 sshd\[11587\]: Failed password for invalid user git from 41.66.244.86 port 54284 ssh2 Jul 14 03:49:06 vlre-nyc-1 sshd\[11685\]: Invalid user acme from 41.66.244.86 Jul 14 03:49:06 vlre-nyc-1 sshd\[11685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 ... |
2020-07-14 18:02:22 |
| attackspam | no |
2020-06-04 19:48:54 |
| attack | Jun 2 13:29:21 localhost sshd[49877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 user=root Jun 2 13:29:24 localhost sshd[49877]: Failed password for root from 41.66.244.86 port 36206 ssh2 Jun 2 13:34:21 localhost sshd[50543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 user=root Jun 2 13:34:23 localhost sshd[50543]: Failed password for root from 41.66.244.86 port 40984 ssh2 Jun 2 13:39:03 localhost sshd[51874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 user=root Jun 2 13:39:06 localhost sshd[51874]: Failed password for root from 41.66.244.86 port 45758 ssh2 ... |
2020-06-02 22:40:14 |
| attackbotsspam | [ssh] SSH attack |
2020-04-23 23:43:08 |
| attackspam | Apr 17 06:16:40 mout sshd[29943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 user=root Apr 17 06:16:42 mout sshd[29943]: Failed password for root from 41.66.244.86 port 43384 ssh2 |
2020-04-17 12:27:55 |
| attackspambots | Apr 8 09:49:38 localhost sshd\[17593\]: Invalid user oracle from 41.66.244.86 port 45222 Apr 8 09:49:38 localhost sshd\[17593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Apr 8 09:49:40 localhost sshd\[17593\]: Failed password for invalid user oracle from 41.66.244.86 port 45222 ssh2 ... |
2020-04-08 18:07:57 |
| attack | Apr 1 00:31:14 server sshd[40622]: Failed password for invalid user www from 41.66.244.86 port 34086 ssh2 Apr 1 00:35:27 server sshd[41770]: Failed password for invalid user hakurei from 41.66.244.86 port 46112 ssh2 Apr 1 00:39:57 server sshd[43192]: Failed password for root from 41.66.244.86 port 58150 ssh2 |
2020-04-01 08:41:30 |
| attackspam | Mar 18 14:04:46 vmd48417 sshd[27109]: Failed password for root from 41.66.244.86 port 32818 ssh2 |
2020-03-19 05:44:50 |
| attack | Feb 15 12:43:16 plusreed sshd[31651]: Invalid user derr from 41.66.244.86 ... |
2020-02-16 01:53:03 |
| attack | Feb 7 05:11:06 ns01 sshd[32593]: Invalid user gvr from 41.66.244.86 Feb 7 05:11:06 ns01 sshd[32593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Feb 7 05:11:08 ns01 sshd[32593]: Failed password for invalid user gvr from 41.66.244.86 port 49578 ssh2 Feb 7 05:20:17 ns01 sshd[622]: Invalid user uyx from 41.66.244.86 Feb 7 05:20:17 ns01 sshd[622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=41.66.244.86 |
2020-02-09 07:14:45 |
| attackspam | Feb 8 01:44:30 h1745522 sshd[16896]: Invalid user vsv from 41.66.244.86 port 35030 Feb 8 01:44:30 h1745522 sshd[16896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Feb 8 01:44:30 h1745522 sshd[16896]: Invalid user vsv from 41.66.244.86 port 35030 Feb 8 01:44:32 h1745522 sshd[16896]: Failed password for invalid user vsv from 41.66.244.86 port 35030 ssh2 Feb 8 01:48:17 h1745522 sshd[16959]: Invalid user rjp from 41.66.244.86 port 57154 Feb 8 01:48:17 h1745522 sshd[16959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.244.86 Feb 8 01:48:17 h1745522 sshd[16959]: Invalid user rjp from 41.66.244.86 port 57154 Feb 8 01:48:18 h1745522 sshd[16959]: Failed password for invalid user rjp from 41.66.244.86 port 57154 ssh2 Feb 8 01:52:23 h1745522 sshd[17036]: Invalid user mwv from 41.66.244.86 port 51342 ... |
2020-02-08 11:09:39 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.66.244.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.66.244.86. IN A
;; AUTHORITY SECTION:
. 556 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020020701 1800 900 604800 86400
;; Query time: 370 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 08 11:09:33 CST 2020
;; MSG SIZE rcvd: 116
Host 86.244.66.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 86.244.66.41.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 167.99.202.143 | attack | Oct 20 09:49:03 server sshd\[9355\]: Invalid user supervisor from 167.99.202.143 Oct 20 09:49:03 server sshd\[9355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.202.143 Oct 20 09:49:06 server sshd\[9355\]: Failed password for invalid user supervisor from 167.99.202.143 port 42224 ssh2 Oct 20 10:01:46 server sshd\[12551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.202.143 user=root Oct 20 10:01:47 server sshd\[12551\]: Failed password for root from 167.99.202.143 port 40964 ssh2 ... |
2019-10-20 18:22:50 |
| 89.222.132.66 | attackspam | [portscan] Port scan |
2019-10-20 18:23:55 |
| 51.254.33.188 | attackspambots | Automatic report - Banned IP Access |
2019-10-20 18:14:14 |
| 111.68.104.130 | attack | Oct 19 20:34:44 kapalua sshd\[24380\]: Invalid user yangyb from 111.68.104.130 Oct 19 20:34:44 kapalua sshd\[24380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.104.130 Oct 19 20:34:46 kapalua sshd\[24380\]: Failed password for invalid user yangyb from 111.68.104.130 port 49517 ssh2 Oct 19 20:39:25 kapalua sshd\[24883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.104.130 user=root Oct 19 20:39:27 kapalua sshd\[24883\]: Failed password for root from 111.68.104.130 port 5948 ssh2 |
2019-10-20 18:21:52 |
| 185.207.232.232 | attackspambots | Oct 20 10:56:20 h2177944 sshd\[10703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.207.232.232 user=root Oct 20 10:56:22 h2177944 sshd\[10703\]: Failed password for root from 185.207.232.232 port 33176 ssh2 Oct 20 11:15:03 h2177944 sshd\[11868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.207.232.232 user=root Oct 20 11:15:05 h2177944 sshd\[11868\]: Failed password for root from 185.207.232.232 port 38036 ssh2 ... |
2019-10-20 18:12:29 |
| 80.13.21.150 | attackspambots | Unauthorised access (Oct 20) SRC=80.13.21.150 LEN=44 TOS=0x08 PREC=0x40 TTL=240 ID=54110 TCP DPT=139 WINDOW=1024 SYN |
2019-10-20 18:12:47 |
| 118.193.31.19 | attack | fail2ban |
2019-10-20 18:39:50 |
| 178.62.71.94 | attack | Automatic report - Banned IP Access |
2019-10-20 18:39:20 |
| 175.137.26.128 | attack | C1,WP GET /manga/wp-login.php |
2019-10-20 18:15:26 |
| 122.114.253.186 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-20 18:20:03 |
| 175.180.131.232 | attackspam | Oct 20 09:52:26 vmanager6029 sshd\[15860\]: Invalid user chandler from 175.180.131.232 port 57652 Oct 20 09:52:26 vmanager6029 sshd\[15860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.180.131.232 Oct 20 09:52:28 vmanager6029 sshd\[15860\]: Failed password for invalid user chandler from 175.180.131.232 port 57652 ssh2 |
2019-10-20 18:37:07 |
| 81.22.45.190 | attackbotsspam | 10/20/2019-12:19:35.579494 81.22.45.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-20 18:33:57 |
| 89.248.174.214 | attackbots | 10/20/2019-06:05:46.832298 89.248.174.214 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-20 18:35:29 |
| 185.243.180.39 | attack | Sat, 19 Oct 2019 22:44:43 -0400 Received: from [185.243.180.39] (port=18202 helo=closegroan.best) From: "Xone Phone" |
2019-10-20 18:19:29 |
| 110.34.54.205 | attackspam | Invalid user autoroute from 110.34.54.205 port 50536 |
2019-10-20 18:36:15 |