City: Johannesburg
Region: Gauteng
Country: South Africa
Internet Service Provider: Telkom
Hostname: unknown
Organization: TELKOMMOBILE
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.250.131.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56965
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.250.131.121. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082300 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 24 01:45:55 CST 2019
;; MSG SIZE rcvd: 119
121.131.250.102.in-addr.arpa domain name pointer 8ta-250-131-121.telkomadsl.co.za.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
121.131.250.102.in-addr.arpa name = 8ta-250-131-121.telkomadsl.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
222.135.99.131 | attack | 23/tcp [2019-10-30]1pkt |
2019-10-30 16:45:31 |
106.52.24.184 | attackbots | Invalid user victoria from 106.52.24.184 port 34226 |
2019-10-30 16:59:33 |
212.129.138.67 | attackbots | Oct 30 11:06:00 gw1 sshd[14118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.67 Oct 30 11:06:02 gw1 sshd[14118]: Failed password for invalid user password from 212.129.138.67 port 36342 ssh2 ... |
2019-10-30 16:26:55 |
187.57.131.122 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/187.57.131.122/ BR - 1H : (418) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN27699 IP : 187.57.131.122 CIDR : 187.57.0.0/16 PREFIX COUNT : 267 UNIQUE IP COUNT : 6569728 ATTACKS DETECTED ASN27699 : 1H - 10 3H - 30 6H - 47 12H - 108 24H - 205 DateTime : 2019-10-30 04:50:24 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-10-30 16:46:15 |
203.210.84.82 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-30 16:48:21 |
209.17.96.66 | attackspambots | From CCTV User Interface Log ...::ffff:209.17.96.66 - - [30/Oct/2019:04:38:58 +0000] "-" 400 179 ... |
2019-10-30 17:02:28 |
138.197.89.212 | attackbots | 2019-10-29 23:50:22,587 fail2ban.actions [1798]: NOTICE [sshd] Ban 138.197.89.212 |
2019-10-30 16:48:50 |
152.136.164.23 | attack | Oct 30 09:25:42 MK-Soft-VM3 sshd[474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.164.23 Oct 30 09:25:45 MK-Soft-VM3 sshd[474]: Failed password for invalid user derek from 152.136.164.23 port 46539 ssh2 ... |
2019-10-30 16:46:36 |
114.224.44.235 | attackspam | Oct 29 23:50:06 esmtp postfix/smtpd[32069]: lost connection after AUTH from unknown[114.224.44.235] Oct 29 23:50:08 esmtp postfix/smtpd[32069]: lost connection after AUTH from unknown[114.224.44.235] Oct 29 23:50:09 esmtp postfix/smtpd[32069]: lost connection after AUTH from unknown[114.224.44.235] Oct 29 23:50:11 esmtp postfix/smtpd[32069]: lost connection after AUTH from unknown[114.224.44.235] Oct 29 23:50:12 esmtp postfix/smtpd[32069]: lost connection after AUTH from unknown[114.224.44.235] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=114.224.44.235 |
2019-10-30 16:58:28 |
185.51.201.102 | attackbotsspam | firewall-block, port(s): 1433/tcp |
2019-10-30 16:54:09 |
125.161.130.19 | attackbotsspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2019-10-30 16:54:40 |
36.72.141.6 | attack | 445/tcp [2019-10-30]1pkt |
2019-10-30 16:56:09 |
31.162.49.159 | attackspam | Chat Spam |
2019-10-30 16:44:16 |
177.30.111.71 | attack | 445/tcp [2019-10-30]1pkt |
2019-10-30 16:38:27 |
120.1.95.207 | attackbots | 60001/tcp [2019-10-30]1pkt |
2019-10-30 16:52:10 |