City: Alexandria
Region: Alexandria
Country: Egypt
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.42.245.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34015
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;102.42.245.217. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:30:34 CST 2022
;; MSG SIZE rcvd: 107
217.245.42.102.in-addr.arpa domain name pointer host-102.42.245.217.tedata.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
217.245.42.102.in-addr.arpa name = host-102.42.245.217.tedata.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
103.127.167.156 | attackspam | firewall-block, port(s): 23/tcp |
2019-07-25 05:51:08 |
189.46.144.48 | attackspam | 23/tcp [2019-07-24]1pkt |
2019-07-25 05:13:34 |
209.141.58.114 | attackbotsspam | Jul 24 13:05:11 borg sshd[41248]: Failed unknown for invalid user admin from 209.141.58.114 port 43390 ssh2 Jul 24 13:05:12 borg sshd[41248]: error: PAM: Authentication error for illegal user admin from 209.141.58.114 Jul 24 13:05:12 borg sshd[41248]: Failed keyboard-interactive/pam for invalid user admin from 209.141.58.114 port 43390 ssh2 ... |
2019-07-25 05:46:16 |
222.190.151.98 | attackspam | 8080/tcp 8080/tcp [2019-07-24]2pkt |
2019-07-25 05:45:17 |
61.219.11.153 | attack | firewall-block, port(s): 443/tcp |
2019-07-25 05:17:02 |
125.64.94.212 | attack | firewall-block, port(s): 2323/tcp, 8291/tcp, 29999/tcp |
2019-07-25 05:50:03 |
113.160.223.167 | attackbotsspam | Jul 24 16:40:54 **** sshd[17490]: Did not receive identification string from 113.160.223.167 port 54293 |
2019-07-25 05:33:17 |
36.233.101.79 | attackspam | 37215/tcp [2019-07-24]1pkt |
2019-07-25 05:36:09 |
170.130.187.2 | attack | Honeypot hit. |
2019-07-25 05:22:44 |
42.157.128.50 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-25 05:06:43 |
45.13.39.167 | attackbotsspam | Jul 24 23:21:37 mail postfix/smtpd\[26415\]: warning: unknown\[45.13.39.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 24 23:52:09 mail postfix/smtpd\[27633\]: warning: unknown\[45.13.39.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 24 23:52:44 mail postfix/smtpd\[28095\]: warning: unknown\[45.13.39.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 24 23:53:22 mail postfix/smtpd\[28113\]: warning: unknown\[45.13.39.167\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-07-25 05:52:05 |
198.108.66.124 | attackbots | firewall-block, port(s): 8883/tcp |
2019-07-25 05:40:11 |
134.209.53.220 | attack | WordPress login Brute force / Web App Attack on client site. |
2019-07-25 05:11:32 |
205.185.116.180 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-25 05:13:52 |
217.58.186.155 | attackspam | port scan and connect, tcp 23 (telnet) |
2019-07-25 05:18:56 |