City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.139.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54964
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.213.139.249. IN A
;; AUTHORITY SECTION:
. 200 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400
;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 06:29:51 CST 2022
;; MSG SIZE rcvd: 108
249.139.213.105.in-addr.arpa domain name pointer 105-213-139-249.access.mtnbusiness.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
249.139.213.105.in-addr.arpa name = 105-213-139-249.access.mtnbusiness.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
183.103.35.202 | attackbots | Nov 11 00:44:19 XXX sshd[34503]: Invalid user ky from 183.103.35.202 port 57626 |
2019-11-11 09:13:04 |
114.57.190.131 | attackspambots | Automatic report - Banned IP Access |
2019-11-11 08:48:19 |
180.180.122.31 | attackbots | 80 failed attempt(s) in the last 24h |
2019-11-11 09:13:30 |
159.89.91.214 | attack | A lockdown event has occurred due to too many failed login attempts or invalid username: Username: #profilepage IP Address: 159.89.91.214 |
2019-11-11 11:30:13 |
83.97.20.235 | attack | firewall-block, port(s): 80/tcp |
2019-11-11 08:43:10 |
121.239.88.217 | attackbotsspam | SASL broute force |
2019-11-11 09:05:06 |
106.13.38.59 | attackspambots | Nov 11 01:42:58 ns41 sshd[12144]: Failed password for mysql from 106.13.38.59 port 35712 ssh2 Nov 11 01:42:58 ns41 sshd[12144]: Failed password for mysql from 106.13.38.59 port 35712 ssh2 |
2019-11-11 09:04:01 |
137.59.161.162 | attack | Spamassassin_137.59.161.162 |
2019-11-11 08:51:12 |
177.72.80.46 | attackspam | postfix |
2019-11-11 08:42:39 |
142.44.243.161 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-11 09:03:45 |
197.157.221.199 | attackspambots | IMAP/SMTP Authentication Failure |
2019-11-11 08:57:10 |
89.248.160.178 | attack | firewall-block, port(s): 3429/tcp |
2019-11-11 08:40:28 |
185.176.27.118 | attackbots | 185.176.27.118 was recorded 71 times by 16 hosts attempting to connect to the following ports: 50001,9001,50000,7000,51,1,10000,4001,30001,4,70,200,401,500,5000,201,81,71,701,400,2001,60001,40001,10001,101,91,900,90,20000,11,2,3,3000,100,31,501,10,50,30000,4000,41,700,40. Incident counter (4h, 24h, all-time): 71, 264, 2350 |
2019-11-11 08:39:07 |
188.166.181.139 | attack | A lockdown event has occurred due to too many failed login attempts or invalid username: Username: #profilepage IP Address: 188.166.181.139 |
2019-11-11 12:53:42 |
94.23.6.187 | attackspambots | SSH Brute Force, server-1 sshd[14623]: Failed password for invalid user takeru from 94.23.6.187 port 44703 ssh2 |
2019-11-11 08:54:48 |