City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: MTN
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.211.104.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19674
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.211.104.72. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 03:04:22 CST 2022
;; MSG SIZE rcvd: 107
72.104.211.105.in-addr.arpa domain name pointer 105-211-104-72.access.mtnbusiness.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
72.104.211.105.in-addr.arpa name = 105-211-104-72.access.mtnbusiness.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
39.69.71.32 | attackspam | UTC: 2019-11-30 port: 23/tcp |
2019-12-01 22:05:52 |
218.92.0.193 | attackbotsspam | Dec 1 14:31:15 v22018076622670303 sshd\[28543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.193 user=root Dec 1 14:31:17 v22018076622670303 sshd\[28543\]: Failed password for root from 218.92.0.193 port 52177 ssh2 Dec 1 14:31:20 v22018076622670303 sshd\[28543\]: Failed password for root from 218.92.0.193 port 52177 ssh2 ... |
2019-12-01 21:36:05 |
78.170.42.185 | attackbots | Automatic report - Port Scan Attack |
2019-12-01 21:43:33 |
103.243.107.92 | attack | 2019-12-01T07:24:58.120107abusebot-3.cloudsearch.cf sshd\[19641\]: Invalid user shit from 103.243.107.92 port 39528 |
2019-12-01 21:52:02 |
31.193.122.18 | attackspambots | [portscan] Port scan |
2019-12-01 21:29:48 |
14.177.159.63 | attack | Brute force attempt |
2019-12-01 21:42:11 |
125.227.255.79 | attackspam | SSH Bruteforce attack |
2019-12-01 21:22:50 |
182.61.108.96 | attackspambots | Brute force attempt |
2019-12-01 22:01:33 |
186.130.80.139 | attackbots | Unauthorised access (Dec 1) SRC=186.130.80.139 LEN=40 TOS=0x10 PREC=0x40 TTL=52 ID=43137 TCP DPT=23 WINDOW=38867 SYN |
2019-12-01 21:36:54 |
116.206.245.49 | attackspam | (sshd) Failed SSH login from 116.206.245.49 (LK/Sri Lanka/Colombo District/Colombo/-/[AS18001 Dialog Axiata PLC.]): 1 in the last 3600 secs |
2019-12-01 21:21:07 |
164.52.24.171 | attackbotsspam | 1723/tcp 445/tcp... [2019-10-06/12-01]11pkt,2pt.(tcp) |
2019-12-01 21:46:58 |
185.175.244.124 | attackspambots | Automatic report - Banned IP Access |
2019-12-01 21:50:30 |
2607:f1c0:865:6100::2e:9d7d | attack | Auto reported by IDS |
2019-12-01 21:27:20 |
103.83.5.41 | attackspam | Unauthorized SSH login attempts |
2019-12-01 21:31:13 |
197.46.0.169 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2019-12-01 21:30:12 |