City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.122.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.213.122.150. IN A
;; AUTHORITY SECTION:
. 550 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:47:51 CST 2022
;; MSG SIZE rcvd: 108
150.122.213.105.in-addr.arpa domain name pointer 105-213-122-150.access.mtnbusiness.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
150.122.213.105.in-addr.arpa name = 105-213-122-150.access.mtnbusiness.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
218.92.0.138 | attackbotsspam | Sep 25 07:36:10 marvibiene sshd[4671]: Failed password for root from 218.92.0.138 port 43944 ssh2 Sep 25 07:36:14 marvibiene sshd[4671]: Failed password for root from 218.92.0.138 port 43944 ssh2 Sep 25 07:36:19 marvibiene sshd[4671]: Failed password for root from 218.92.0.138 port 43944 ssh2 Sep 25 07:36:25 marvibiene sshd[4671]: Failed password for root from 218.92.0.138 port 43944 ssh2 |
2020-09-25 14:10:24 |
210.92.18.162 | attack | lfd: (smtpauth) Failed SMTP AUTH login from 210.92.18.162 (host.webhostingservice.ml): 5 in the last 3600 secs - Wed Sep 5 02:20:04 2018 |
2020-09-25 14:38:43 |
51.103.136.3 | attack | 2020-09-25T06:39:58.308065randservbullet-proofcloud-66.localdomain sshd[32348]: Invalid user singsys from 51.103.136.3 port 33469 2020-09-25T06:39:58.313163randservbullet-proofcloud-66.localdomain sshd[32348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.103.136.3 2020-09-25T06:39:58.308065randservbullet-proofcloud-66.localdomain sshd[32348]: Invalid user singsys from 51.103.136.3 port 33469 2020-09-25T06:40:00.802642randservbullet-proofcloud-66.localdomain sshd[32348]: Failed password for invalid user singsys from 51.103.136.3 port 33469 ssh2 ... |
2020-09-25 14:42:01 |
222.186.175.150 | attack | Sep 25 06:30:35 scw-6657dc sshd[13416]: Failed password for root from 222.186.175.150 port 34318 ssh2 Sep 25 06:30:35 scw-6657dc sshd[13416]: Failed password for root from 222.186.175.150 port 34318 ssh2 Sep 25 06:30:38 scw-6657dc sshd[13416]: Failed password for root from 222.186.175.150 port 34318 ssh2 ... |
2020-09-25 14:38:12 |
208.68.39.220 | attackbots | Port scanning [2 denied] |
2020-09-25 14:35:28 |
176.63.165.142 | attackbots | Hits on port : 445 |
2020-09-25 14:26:19 |
104.211.78.121 | attackbots | 2020-09-25T08:29:53.684455ks3355764 sshd[11758]: Invalid user angara from 104.211.78.121 port 23131 2020-09-25T08:29:55.468694ks3355764 sshd[11758]: Failed password for invalid user angara from 104.211.78.121 port 23131 ssh2 ... |
2020-09-25 14:40:52 |
49.234.28.148 | attackspambots | $f2bV_matches |
2020-09-25 14:28:54 |
222.186.180.130 | attackbots | Sep 25 08:26:13 markkoudstaal sshd[18833]: Failed password for root from 222.186.180.130 port 56379 ssh2 Sep 25 08:26:15 markkoudstaal sshd[18833]: Failed password for root from 222.186.180.130 port 56379 ssh2 Sep 25 08:26:18 markkoudstaal sshd[18833]: Failed password for root from 222.186.180.130 port 56379 ssh2 ... |
2020-09-25 14:32:48 |
49.235.209.206 | attackbots | Sep 25 07:42:42 |
2020-09-25 14:49:01 |
42.227.41.195 | attackbotsspam | Listed on abuseat.org plus zen-spamhaus / proto=6 . srcport=35377 . dstport=8080 . (3632) |
2020-09-25 14:13:33 |
40.76.192.252 | attackbots | Sep 25 08:18:54 ns381471 sshd[22318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.76.192.252 Sep 25 08:18:56 ns381471 sshd[22318]: Failed password for invalid user topbunk from 40.76.192.252 port 8697 ssh2 |
2020-09-25 14:37:54 |
54.38.156.28 | attackbotsspam | Sep 25 04:43:59 l02a sshd[1042]: Invalid user student from 54.38.156.28 Sep 25 04:43:59 l02a sshd[1042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-41b62bf2.vps.ovh.net Sep 25 04:43:59 l02a sshd[1042]: Invalid user student from 54.38.156.28 Sep 25 04:44:02 l02a sshd[1042]: Failed password for invalid user student from 54.38.156.28 port 50972 ssh2 |
2020-09-25 14:13:00 |
185.8.175.173 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-09-25 14:47:48 |
218.80.227.83 | attackspam | Unauthorized connection attempt from IP address 218.80.227.83 on Port 445(SMB) |
2020-09-25 14:08:28 |