City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.252.69.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;102.252.69.124. IN A
;; AUTHORITY SECTION:
. 315 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 22 00:45:04 CST 2023
;; MSG SIZE rcvd: 107
124.69.252.102.in-addr.arpa domain name pointer 8ta-252-69-124.telkomadsl.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
124.69.252.102.in-addr.arpa name = 8ta-252-69-124.telkomadsl.co.za.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 36.37.226.39 | attackbots | $f2bV_matches |
2020-04-02 03:40:00 |
| 109.168.34.213 | attackspam | firewall-block, port(s): 23/tcp |
2020-04-02 03:04:15 |
| 36.72.69.254 | attackspam | firewall-block, port(s): 445/tcp |
2020-04-02 03:14:24 |
| 192.241.201.182 | attackbotsspam | (sshd) Failed SSH login from 192.241.201.182 (US/United States/-): 5 in the last 3600 secs |
2020-04-02 03:45:30 |
| 1.194.123.198 | attack | Apr 1 14:10:51 ns382633 sshd\[12661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.194.123.198 user=root Apr 1 14:10:53 ns382633 sshd\[12661\]: Failed password for root from 1.194.123.198 port 34838 ssh2 Apr 1 14:15:57 ns382633 sshd\[13653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.194.123.198 user=root Apr 1 14:15:59 ns382633 sshd\[13653\]: Failed password for root from 1.194.123.198 port 44792 ssh2 Apr 1 14:29:34 ns382633 sshd\[16058\]: Invalid user Password!@\#\$%\^\& from 1.194.123.198 port 52816 Apr 1 14:29:34 ns382633 sshd\[16058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.194.123.198 |
2020-04-02 03:25:37 |
| 222.186.15.166 | attack | DATE:2020-04-01 21:21:43, IP:222.186.15.166, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq) |
2020-04-02 03:26:09 |
| 85.238.75.135 | attackbotsspam | Apr 1 07:29:39 s158375 sshd[11803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.238.75.135 |
2020-04-02 03:24:37 |
| 54.39.138.249 | attack | fail2ban |
2020-04-02 03:12:50 |
| 162.243.132.150 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-04-02 03:22:09 |
| 83.97.20.49 | attackspambots | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-04-02 03:42:53 |
| 49.88.112.77 | attack | Apr 1 10:30:18 firewall sshd[21326]: Failed password for root from 49.88.112.77 port 42687 ssh2 Apr 1 10:30:21 firewall sshd[21326]: Failed password for root from 49.88.112.77 port 42687 ssh2 Apr 1 10:30:23 firewall sshd[21326]: Failed password for root from 49.88.112.77 port 42687 ssh2 ... |
2020-04-02 03:14:07 |
| 185.143.223.81 | attackbotsspam | Apr 1 20:15:40 [host] kernel: [2394349.918830] [U Apr 1 20:15:51 [host] kernel: [2394360.756428] [U Apr 1 20:17:04 [host] kernel: [2394434.271791] [U Apr 1 20:18:27 [host] kernel: [2394516.998141] [U Apr 1 20:22:22 [host] kernel: [2394751.419937] [U Apr 1 20:35:58 [host] kernel: [2395567.601704] [U |
2020-04-02 03:09:57 |
| 49.232.144.7 | attackspambots | Invalid user jdf from 49.232.144.7 port 58728 |
2020-04-02 03:32:39 |
| 114.67.112.231 | attackbotsspam | Apr 1 02:44:07 web9 sshd\[28810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.112.231 user=root Apr 1 02:44:09 web9 sshd\[28810\]: Failed password for root from 114.67.112.231 port 58784 ssh2 Apr 1 02:48:48 web9 sshd\[29432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.112.231 user=root Apr 1 02:48:51 web9 sshd\[29432\]: Failed password for root from 114.67.112.231 port 58798 ssh2 Apr 1 02:53:49 web9 sshd\[30075\]: Invalid user couchdb from 114.67.112.231 |
2020-04-02 03:27:22 |
| 222.186.190.17 | attackspam | Apr 1 18:52:16 ip-172-31-62-245 sshd\[11962\]: Failed password for root from 222.186.190.17 port 62148 ssh2\ Apr 1 18:52:40 ip-172-31-62-245 sshd\[11964\]: Failed password for root from 222.186.190.17 port 11320 ssh2\ Apr 1 18:53:09 ip-172-31-62-245 sshd\[11966\]: Failed password for root from 222.186.190.17 port 64516 ssh2\ Apr 1 18:54:01 ip-172-31-62-245 sshd\[11981\]: Failed password for root from 222.186.190.17 port 62210 ssh2\ Apr 1 18:54:04 ip-172-31-62-245 sshd\[11981\]: Failed password for root from 222.186.190.17 port 62210 ssh2\ |
2020-04-02 03:24:59 |