City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: Avanti-AS
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.140.52.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61249
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.140.52.118. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072502 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 26 05:14:03 CST 2019
;; MSG SIZE rcvd: 118
Host 118.52.140.102.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 118.52.140.102.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
202.47.116.107 | attack | 20 attempts against mh-ssh on cloud |
2020-06-08 12:32:18 |
195.138.93.233 | attackbots | Automatic report - Banned IP Access |
2020-06-08 13:00:11 |
185.39.10.45 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 15017 proto: TCP cat: Misc Attack |
2020-06-08 12:42:31 |
240e:3a0:5802:3758:2e0:4c4b:963b:1e4a | attackbotsspam | 1433/tcp 1433/tcp 1433/tcp [2020-06-08]3pkt |
2020-06-08 12:59:55 |
108.52.18.169 | attackbots | Unauthorized connection attempt detected, IP banned. |
2020-06-08 12:53:44 |
139.155.86.144 | attack | Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-08 13:00:51 |
58.181.114.138 | attackspam | php WP PHPmyadamin ABUSE blocked for 12h |
2020-06-08 12:46:33 |
113.116.128.243 | attack | 1433/tcp [2020-06-08]1pkt |
2020-06-08 12:34:26 |
14.169.47.217 | attackspam | 445/tcp [2020-06-08]1pkt |
2020-06-08 13:04:33 |
42.200.142.45 | attackspam | Repeated brute force against a port |
2020-06-08 12:54:45 |
193.112.19.133 | attack | SSH invalid-user multiple login try |
2020-06-08 12:44:52 |
116.241.94.65 | attackspam | 23/tcp [2020-06-08]1pkt |
2020-06-08 12:45:46 |
49.88.112.69 | attack | Jun 8 07:34:36 pkdns2 sshd\[54284\]: Failed password for root from 49.88.112.69 port 31574 ssh2Jun 8 07:36:02 pkdns2 sshd\[54382\]: Failed password for root from 49.88.112.69 port 60933 ssh2Jun 8 07:36:05 pkdns2 sshd\[54382\]: Failed password for root from 49.88.112.69 port 60933 ssh2Jun 8 07:36:06 pkdns2 sshd\[54382\]: Failed password for root from 49.88.112.69 port 60933 ssh2Jun 8 07:38:03 pkdns2 sshd\[54456\]: Failed password for root from 49.88.112.69 port 22141 ssh2Jun 8 07:38:05 pkdns2 sshd\[54456\]: Failed password for root from 49.88.112.69 port 22141 ssh2Jun 8 07:38:07 pkdns2 sshd\[54456\]: Failed password for root from 49.88.112.69 port 22141 ssh2 ... |
2020-06-08 12:39:24 |
59.57.183.192 | attackspam | Jun 8 06:55:03 hosting sshd[22957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.57.183.192 user=root Jun 8 06:55:05 hosting sshd[22957]: Failed password for root from 59.57.183.192 port 52943 ssh2 ... |
2020-06-08 12:34:38 |
103.106.242.100 | attackbots | 445/tcp [2020-06-08]1pkt |
2020-06-08 13:03:26 |