City: unknown
Region: unknown
Country: Zambia
Internet Service Provider: Airtel
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.144.54.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17817
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;102.144.54.80. IN A
;; AUTHORITY SECTION:
. 163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023102701 1800 900 604800 86400
;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 28 10:28:13 CST 2023
;; MSG SIZE rcvd: 106
80.54.144.102.in-addr.arpa domain name pointer 80-54-144-102.r.airtel.co.zm.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.54.144.102.in-addr.arpa name = 80-54-144-102.r.airtel.co.zm.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
212.171.102.70 | attackbots | Jan 27 00:59:01 ms-srv sshd[45768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.171.102.70 Jan 27 00:59:03 ms-srv sshd[45768]: Failed password for invalid user oper from 212.171.102.70 port 61042 ssh2 |
2020-02-15 23:24:23 |
118.43.105.17 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-16 00:03:03 |
212.115.244.13 | attackspambots | Dec 6 19:40:55 ms-srv sshd[62649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.115.244.13 Dec 6 19:40:57 ms-srv sshd[62649]: Failed password for invalid user admin from 212.115.244.13 port 20114 ssh2 |
2020-02-15 23:49:26 |
193.32.161.31 | attack | 02/15/2020-09:31:42.744603 193.32.161.31 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-15 23:58:27 |
52.224.182.215 | attackspambots | Jan 17 16:00:44 ms-srv sshd[5597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.224.182.215 Jan 17 16:00:46 ms-srv sshd[5597]: Failed password for invalid user apache from 52.224.182.215 port 59938 ssh2 |
2020-02-15 23:51:48 |
79.27.235.172 | attackspambots | Feb 15 15:30:19 MK-Soft-VM8 sshd[1209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.27.235.172 Feb 15 15:30:22 MK-Soft-VM8 sshd[1209]: Failed password for invalid user informix from 79.27.235.172 port 37924 ssh2 ... |
2020-02-15 23:37:38 |
211.197.207.168 | attack | Feb 15 14:52:37 serwer sshd\[17977\]: Invalid user math from 211.197.207.168 port 38647 Feb 15 14:52:37 serwer sshd\[17977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.207.168 Feb 15 14:52:39 serwer sshd\[17977\]: Failed password for invalid user math from 211.197.207.168 port 38647 ssh2 ... |
2020-02-16 00:05:03 |
218.92.0.212 | attackbotsspam | Feb 15 18:47:26 server sshd\[24267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212 user=root Feb 15 18:47:28 server sshd\[24267\]: Failed password for root from 218.92.0.212 port 6346 ssh2 Feb 15 18:47:32 server sshd\[24267\]: Failed password for root from 218.92.0.212 port 6346 ssh2 Feb 15 18:47:35 server sshd\[24267\]: Failed password for root from 218.92.0.212 port 6346 ssh2 Feb 15 18:47:39 server sshd\[24267\]: Failed password for root from 218.92.0.212 port 6346 ssh2 ... |
2020-02-15 23:50:23 |
212.114.63.44 | attackspam | Jan 11 10:07:36 ms-srv sshd[64754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.114.63.44 Jan 11 10:07:39 ms-srv sshd[64754]: Failed password for invalid user student3 from 212.114.63.44 port 56193 ssh2 |
2020-02-15 23:49:49 |
212.129.2.62 | attack | Jan 27 13:02:04 ms-srv sshd[29683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.2.62 Jan 27 13:02:05 ms-srv sshd[29683]: Failed password for invalid user ftptest from 212.129.2.62 port 34271 ssh2 |
2020-02-15 23:41:36 |
94.66.222.65 | attackspam | WordPress XMLRPC scan :: 94.66.222.65 0.100 - [15/Feb/2020:13:52:39 0000] www.[censored_1] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" "HTTP/1.1" |
2020-02-16 00:06:00 |
212.129.138.198 | attackspam | Nov 21 22:16:13 ms-srv sshd[53269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198 user=nobody Nov 21 22:16:15 ms-srv sshd[53269]: Failed password for invalid user nobody from 212.129.138.198 port 56501 ssh2 |
2020-02-15 23:44:33 |
222.186.173.226 | attackspambots | 2020-02-15T16:30:19.720576struts4.enskede.local sshd\[28671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226 user=root 2020-02-15T16:30:21.676359struts4.enskede.local sshd\[28671\]: Failed password for root from 222.186.173.226 port 7768 ssh2 2020-02-15T16:30:27.633853struts4.enskede.local sshd\[28671\]: Failed password for root from 222.186.173.226 port 7768 ssh2 2020-02-15T16:30:32.664967struts4.enskede.local sshd\[28671\]: Failed password for root from 222.186.173.226 port 7768 ssh2 2020-02-15T16:30:37.230079struts4.enskede.local sshd\[28671\]: Failed password for root from 222.186.173.226 port 7768 ssh2 ... |
2020-02-15 23:34:57 |
212.12.172.155 | attackspambots | Jan 1 13:53:37 ms-srv sshd[44887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.12.172.155 Jan 1 13:53:39 ms-srv sshd[44887]: Failed password for invalid user yoyo from 212.12.172.155 port 60508 ssh2 |
2020-02-15 23:48:55 |
204.12.102.48 | spam | MARRE de ces ORDURES de FILS de PUTES, avec la complicité de SOUS MERDES comme tucows.com, hostmysite.com, hosting.com, 1&1 etc. qui POLLUENT la Planète par DIX POURRIELS par jour pour du SEXE sur des listes VOLÉES on ne sait où mais SANS notre accord, à condamner selon la législation Européenne à 750 € par SPAM émis ! bluemaze.com>208.112.4.227 208.112.100.250>hostmysite.com r.stern@snafu.de>84.23.254.19 marcelmaurer.de>217.160.0.60 cd.de>91.195.240.126 91.195.240.126>internetx.com https://www.mywot.com/scorecard/snafu.de https://www.mywot.com/scorecard/automatedfiling.com https://www.mywot.com/scorecard/safesecureweb.com https://www.mywot.com/scorecard/quickdateloversfinder.com https://www.mywot.com/scorecard/quickdateladiesfinder.com https://www.mywot.com/scorecard/honeyadultsfinder.com https://www.mywot.com/scorecard/tucows.com https://www.mywot.com/scorecard/hostmysite.com https://www.mywot.com/scorecard/hosting.com https://www.mywot.com/scorecard/internetx.com https://www.mywot.com/scorecard/bluemaze.com https://www.mywot.com/scorecard/marcelmaurer.de https://www.mywot.com/scorecard/cd.de https://www.mywot.com/scorecard/ntirety.com https://en.asytech.cn/report-ip/84.23.254.19 https://en.asytech.cn/check-ip/91.195.240.126 https://en.asytech.cn/check-ip/204.12.102.48 https://en.asytech.cn/check-ip/204.12.102.38 https://en.asytech.cn/check-ip/208.112.4.227 https://en.asytech.cn/report-ip/208.112.100.250 info@automatedfiling.com which send as usual to : https://quickdateloversfinder.com/mwoirzmytgwlwhw%3Ft%3Dsssh&sa=D&sntz=1&usg=AFQjCNGmyUXvyNHS-Zi5EZn1NbKHoi4HWg https://quickdateladiesfinder.com/qekunaexcpeybtq%3Ft%3Dsssh&sa=D&sntz=1&usg=AFQjCNFLQr5ay7CeNkORk8kFzabi459ERg https://honeyadultsfinder.com/qekunaexcpeybtq%3Ft%3Dsssh&sa=D&sntz=1&usg=AFQjCNHQfXGDny2XcfKOpvsGGQRGhJg_8A or : support@bluemaze.com>godaddy>204.12.102.38 which send to : https://findher2date.com/tds/cpa?tdsId=p1024sad_r} https://goo.su/0HWB |
2020-02-16 00:05:57 |