City: Benoni
Region: Gauteng
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.249.208.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.249.208.86. IN A
;; AUTHORITY SECTION:
. 590 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020010200 1800 900 604800 86400
;; Query time: 206 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 02 21:50:48 CST 2020
;; MSG SIZE rcvd: 118
86.208.249.102.in-addr.arpa domain name pointer 8ta-249-208-86.telkomadsl.co.za.
Server: 100.100.2.136
Address: 100.100.2.136#53
Non-authoritative answer:
86.208.249.102.in-addr.arpa name = 8ta-249-208-86.telkomadsl.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
159.203.201.231 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/159.203.201.231/ NL - 1H : (365) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : NL NAME ASN : ASN14061 IP : 159.203.201.231 CIDR : 159.203.192.0/20 PREFIX COUNT : 490 UNIQUE IP COUNT : 1963008 WYKRYTE ATAKI Z ASN14061 : 1H - 2 3H - 9 6H - 18 12H - 33 24H - 66 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery |
2019-09-30 01:51:31 |
1.24.64.180 | attackspam | (Sep 29) LEN=40 TTL=49 ID=57694 TCP DPT=8080 WINDOW=12213 SYN (Sep 29) LEN=40 TTL=49 ID=47620 TCP DPT=8080 WINDOW=12213 SYN (Sep 28) LEN=40 TTL=49 ID=20088 TCP DPT=8080 WINDOW=26287 SYN (Sep 28) LEN=40 TTL=49 ID=20221 TCP DPT=8080 WINDOW=32447 SYN (Sep 28) LEN=40 TTL=49 ID=62037 TCP DPT=8080 WINDOW=12213 SYN (Sep 27) LEN=40 TTL=49 ID=47587 TCP DPT=8080 WINDOW=26287 SYN (Sep 27) LEN=40 TTL=49 ID=25589 TCP DPT=8080 WINDOW=32447 SYN (Sep 27) LEN=40 TTL=49 ID=47961 TCP DPT=8080 WINDOW=26287 SYN (Sep 27) LEN=40 TTL=49 ID=36854 TCP DPT=8080 WINDOW=12213 SYN (Sep 26) LEN=40 TTL=49 ID=43286 TCP DPT=8080 WINDOW=26287 SYN (Sep 26) LEN=40 TTL=49 ID=43234 TCP DPT=8080 WINDOW=32447 SYN (Sep 26) LEN=40 TTL=49 ID=18421 TCP DPT=8080 WINDOW=12213 SYN (Sep 26) LEN=40 TTL=49 ID=60487 TCP DPT=8080 WINDOW=26287 SYN (Sep 26) LEN=40 TTL=49 ID=37120 TCP DPT=8080 WINDOW=32447 SYN (Sep 25) LEN=40 TTL=49 ID=49499 TCP DPT=8080 WINDOW=32447 SYN |
2019-09-30 01:44:23 |
113.190.192.56 | attackspam | Chat Spam |
2019-09-30 01:50:59 |
51.83.74.45 | attackbotsspam | Sep 29 05:05:13 aiointranet sshd\[25647\]: Invalid user antivir from 51.83.74.45 Sep 29 05:05:13 aiointranet sshd\[25647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-51-83-74.eu Sep 29 05:05:16 aiointranet sshd\[25647\]: Failed password for invalid user antivir from 51.83.74.45 port 57096 ssh2 Sep 29 05:09:38 aiointranet sshd\[26074\]: Invalid user eduard from 51.83.74.45 Sep 29 05:09:38 aiointranet sshd\[26074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-51-83-74.eu |
2019-09-30 01:16:21 |
202.119.81.229 | attackspambots | Sep 29 19:36:28 pkdns2 sshd\[52039\]: Invalid user umountfs from 202.119.81.229Sep 29 19:36:29 pkdns2 sshd\[52039\]: Failed password for invalid user umountfs from 202.119.81.229 port 38972 ssh2Sep 29 19:40:44 pkdns2 sshd\[52231\]: Invalid user test from 202.119.81.229Sep 29 19:40:46 pkdns2 sshd\[52231\]: Failed password for invalid user test from 202.119.81.229 port 41762 ssh2Sep 29 19:45:04 pkdns2 sshd\[52355\]: Invalid user login from 202.119.81.229Sep 29 19:45:05 pkdns2 sshd\[52355\]: Failed password for invalid user login from 202.119.81.229 port 44552 ssh2 ... |
2019-09-30 01:25:13 |
60.113.85.41 | attack | Sep 29 17:14:42 venus sshd\[32065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.113.85.41 user=root Sep 29 17:14:44 venus sshd\[32065\]: Failed password for root from 60.113.85.41 port 51618 ssh2 Sep 29 17:18:44 venus sshd\[32175\]: Invalid user backupadmin from 60.113.85.41 port 35022 ... |
2019-09-30 01:31:37 |
182.86.224.238 | attackbots | Automated reporting of FTP Brute Force |
2019-09-30 01:21:21 |
185.175.93.25 | attackspam | Multiport scan : 5 ports scanned 3380 3390(x2) 4444 9999 50000 |
2019-09-30 01:19:22 |
41.144.67.171 | attackspam | 60001/tcp [2019-09-29]1pkt |
2019-09-30 01:31:13 |
222.186.173.180 | attackspam | Triggered by Fail2Ban at Ares web server |
2019-09-30 01:22:47 |
114.242.34.8 | attackbotsspam | 2019-09-29T10:30:45.041219-07:00 suse-nuc sshd[10794]: Invalid user jdkim from 114.242.34.8 port 43726 ... |
2019-09-30 01:54:12 |
178.214.254.251 | attackbots | Lines containing failures of 178.214.254.251 Sep 26 11:18:32 shared04 sshd[5714]: Invalid user martin from 178.214.254.251 port 51227 Sep 26 11:18:32 shared04 sshd[5714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.214.254.251 Sep 26 11:18:34 shared04 sshd[5714]: Failed password for invalid user martin from 178.214.254.251 port 51227 ssh2 Sep 26 11:18:34 shared04 sshd[5714]: Received disconnect from 178.214.254.251 port 51227:11: Bye Bye [preauth] Sep 26 11:18:34 shared04 sshd[5714]: Disconnected from invalid user martin 178.214.254.251 port 51227 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=178.214.254.251 |
2019-09-30 01:29:53 |
220.133.42.32 | attackspam | Port scan |
2019-09-30 01:38:20 |
79.120.183.51 | attackbots | 2019-09-29T13:04:29.204274abusebot-5.cloudsearch.cf sshd\[30206\]: Invalid user mu from 79.120.183.51 port 33538 |
2019-09-30 01:48:21 |
202.51.110.214 | attack | Sep 29 19:33:47 vps01 sshd[25289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214 Sep 29 19:33:49 vps01 sshd[25289]: Failed password for invalid user admin123 from 202.51.110.214 port 39775 ssh2 |
2019-09-30 01:44:50 |