City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.116.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.213.116.140. IN A
;; AUTHORITY SECTION:
. 597 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:15:34 CST 2022
;; MSG SIZE rcvd: 108
140.116.213.105.in-addr.arpa domain name pointer 105-213-116-140.access.mtnbusiness.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.116.213.105.in-addr.arpa name = 105-213-116-140.access.mtnbusiness.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
222.186.31.166 | attack | May 20 09:40:10 gw1 sshd[16107]: Failed password for root from 222.186.31.166 port 42968 ssh2 May 20 09:40:13 gw1 sshd[16107]: Failed password for root from 222.186.31.166 port 42968 ssh2 ... |
2020-05-20 12:41:32 |
61.157.91.111 | attack | Unauthorized connection attempt detected from IP address 61.157.91.111 to port 1433 [T] |
2020-05-20 12:32:27 |
92.63.194.127 | attackspambots | Unauthorized connection attempt detected from IP address 92.63.194.127 to port 5900 [T] |
2020-05-20 12:31:39 |
123.195.56.212 | attackbotsspam | Unauthorized connection attempt detected from IP address 123.195.56.212 to port 9000 [T] |
2020-05-20 12:22:02 |
223.149.163.179 | attackspam | Unauthorized connection attempt detected from IP address 223.149.163.179 to port 23 [T] |
2020-05-20 12:39:14 |
116.114.95.188 | attackbotsspam | Unauthorized connection attempt detected from IP address 116.114.95.188 to port 23 [T] |
2020-05-20 13:00:08 |
182.148.122.15 | attackbots | Unauthorized connection attempt detected from IP address 182.148.122.15 to port 1433 [T] |
2020-05-20 12:47:46 |
124.205.137.84 | attack | Unauthorized connection attempt detected from IP address 124.205.137.84 to port 1433 [T] |
2020-05-20 12:55:47 |
175.175.251.147 | attackspambots | Unauthorized connection attempt detected from IP address 175.175.251.147 to port 23 [T] |
2020-05-20 12:49:18 |
115.49.36.87 | attackbots | Unauthorized connection attempt detected from IP address 115.49.36.87 to port 23 [T] |
2020-05-20 13:00:50 |
131.255.236.182 | attackspam | Unauthorized connection attempt detected from IP address 131.255.236.182 to port 445 |
2020-05-20 12:53:38 |
59.33.136.239 | attackspambots | Unauthorized connection attempt detected from IP address 59.33.136.239 to port 5555 [T] |
2020-05-20 12:33:38 |
178.76.249.234 | attack | Unauthorized connection attempt detected from IP address 178.76.249.234 to port 23 [T] |
2020-05-20 12:48:53 |
101.229.76.182 | attackspam | Unauthorized connection attempt detected from IP address 101.229.76.182 to port 445 [T] |
2020-05-20 12:30:19 |
106.110.54.233 | attack | Unauthorized connection attempt detected from IP address 106.110.54.233 to port 23 [T] |
2020-05-20 12:27:40 |