City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.8.11.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.8.11.26. IN A
;; AUTHORITY SECTION:
. 118 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024052401 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 25 06:23:02 CST 2024
;; MSG SIZE rcvd: 103
26.11.8.41.in-addr.arpa domain name pointer vc-kzn-41-8-11-26.umts.vodacom.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
26.11.8.41.in-addr.arpa name = vc-kzn-41-8-11-26.umts.vodacom.co.za.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.51.178.207 | attackbots | sshd: Failed password for invalid user .... from 122.51.178.207 port 44996 ssh2 (8 attempts) |
2020-06-24 17:28:04 |
| 42.236.102.209 | attackspam | Automated report (2020-06-24T11:51:59+08:00). Scraper detected at this address. |
2020-06-24 17:29:12 |
| 95.167.139.66 | attackspam | " " |
2020-06-24 17:32:19 |
| 189.202.204.230 | attack | Jun 24 11:03:10 pkdns2 sshd\[44869\]: Invalid user og from 189.202.204.230Jun 24 11:03:12 pkdns2 sshd\[44869\]: Failed password for invalid user og from 189.202.204.230 port 38663 ssh2Jun 24 11:06:52 pkdns2 sshd\[45051\]: Invalid user gzg from 189.202.204.230Jun 24 11:06:54 pkdns2 sshd\[45051\]: Failed password for invalid user gzg from 189.202.204.230 port 37782 ssh2Jun 24 11:10:33 pkdns2 sshd\[45260\]: Invalid user glftpd from 189.202.204.230Jun 24 11:10:35 pkdns2 sshd\[45260\]: Failed password for invalid user glftpd from 189.202.204.230 port 36901 ssh2 ... |
2020-06-24 17:28:35 |
| 200.195.174.228 | attackspambots | Jun 24 06:26:03 haigwepa sshd[30717]: Failed password for root from 200.195.174.228 port 38116 ssh2 ... |
2020-06-24 17:24:18 |
| 91.202.198.170 | attackspambots | Unauthorized connection attempt detected from IP address 91.202.198.170 to port 23 [T] |
2020-06-24 17:32:33 |
| 111.229.4.247 | attackspam | leo_www |
2020-06-24 17:26:48 |
| 161.35.104.69 | attackbots | 161.35.104.69 - - [24/Jun/2020:05:51:16 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 161.35.104.69 - - [24/Jun/2020:05:51:17 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 161.35.104.69 - - [24/Jun/2020:05:51:18 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-24 17:50:26 |
| 221.217.55.45 | attackspam | 2020-06-24T05:51:09.906042galaxy.wi.uni-potsdam.de sshd[10400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.217.55.45 2020-06-24T05:51:09.645150galaxy.wi.uni-potsdam.de sshd[10400]: Invalid user admin from 221.217.55.45 port 37679 2020-06-24T05:51:11.845979galaxy.wi.uni-potsdam.de sshd[10400]: Failed password for invalid user admin from 221.217.55.45 port 37679 ssh2 2020-06-24T05:51:14.379042galaxy.wi.uni-potsdam.de sshd[10406]: Invalid user admin from 221.217.55.45 port 37824 2020-06-24T05:51:14.687714galaxy.wi.uni-potsdam.de sshd[10406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.217.55.45 2020-06-24T05:51:14.379042galaxy.wi.uni-potsdam.de sshd[10406]: Invalid user admin from 221.217.55.45 port 37824 2020-06-24T05:51:15.980338galaxy.wi.uni-potsdam.de sshd[10406]: Failed password for invalid user admin from 221.217.55.45 port 37824 ssh2 2020-06-24T05:51:18.326991galaxy.wi.uni-potsdam.de ss ... |
2020-06-24 17:49:56 |
| 45.55.214.64 | attack | Jun 24 09:25:14 minden010 sshd[10044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.214.64 Jun 24 09:25:17 minden010 sshd[10044]: Failed password for invalid user uftp from 45.55.214.64 port 44724 ssh2 Jun 24 09:28:32 minden010 sshd[10382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.214.64 ... |
2020-06-24 17:57:52 |
| 180.76.232.66 | attackbotsspam | Jun 24 10:14:17 h1745522 sshd[12547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.232.66 user=root Jun 24 10:14:19 h1745522 sshd[12547]: Failed password for root from 180.76.232.66 port 47924 ssh2 Jun 24 10:15:46 h1745522 sshd[12638]: Invalid user xuyf from 180.76.232.66 port 57818 Jun 24 10:15:46 h1745522 sshd[12638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.232.66 Jun 24 10:15:46 h1745522 sshd[12638]: Invalid user xuyf from 180.76.232.66 port 57818 Jun 24 10:15:48 h1745522 sshd[12638]: Failed password for invalid user xuyf from 180.76.232.66 port 57818 ssh2 Jun 24 10:19:04 h1745522 sshd[12796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.232.66 user=root Jun 24 10:19:06 h1745522 sshd[12796]: Failed password for root from 180.76.232.66 port 49354 ssh2 Jun 24 10:22:13 h1745522 sshd[13041]: pam_unix(sshd:auth): authentication failu ... |
2020-06-24 17:43:40 |
| 173.232.33.109 | spam | Aggressive email spammer on subnet 173.232.33.* |
2020-06-24 17:58:35 |
| 223.149.108.9 | attackspam | remote command execution vulnerability |
2020-06-24 17:38:02 |
| 112.85.42.178 | attack | Jun 24 11:20:59 server sshd[46016]: Failed none for root from 112.85.42.178 port 43320 ssh2 Jun 24 11:21:02 server sshd[46016]: Failed password for root from 112.85.42.178 port 43320 ssh2 Jun 24 11:21:06 server sshd[46016]: Failed password for root from 112.85.42.178 port 43320 ssh2 |
2020-06-24 17:23:47 |
| 106.54.83.45 | attackbotsspam | Jun 24 13:14:43 itv-usvr-02 sshd[25901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.83.45 user=root Jun 24 13:14:45 itv-usvr-02 sshd[25901]: Failed password for root from 106.54.83.45 port 38206 ssh2 Jun 24 13:17:32 itv-usvr-02 sshd[26001]: Invalid user botmaster from 106.54.83.45 port 53386 Jun 24 13:17:32 itv-usvr-02 sshd[26001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.83.45 Jun 24 13:17:32 itv-usvr-02 sshd[26001]: Invalid user botmaster from 106.54.83.45 port 53386 Jun 24 13:17:34 itv-usvr-02 sshd[26001]: Failed password for invalid user botmaster from 106.54.83.45 port 53386 ssh2 |
2020-06-24 17:31:32 |