City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.70.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10303
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.213.70.30. IN A
;; AUTHORITY SECTION:
. 347 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:52:41 CST 2022
;; MSG SIZE rcvd: 106
30.70.213.105.in-addr.arpa domain name pointer 105-213-70-30.access.mtnbusiness.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
30.70.213.105.in-addr.arpa name = 105-213-70-30.access.mtnbusiness.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
183.16.209.174 | attack | [portscan] Port scan |
2019-10-26 20:11:50 |
167.99.75.174 | attack | Oct 26 14:05:21 jane sshd[7504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.174 Oct 26 14:05:23 jane sshd[7504]: Failed password for invalid user mysql from 167.99.75.174 port 40444 ssh2 ... |
2019-10-26 20:28:34 |
148.251.20.137 | attackbots | 10/26/2019-08:35:42.370899 148.251.20.137 Protocol: 6 ET SCAN Potential SSH Scan |
2019-10-26 20:36:13 |
94.191.76.23 | attack | Oct 26 12:02:20 hcbbdb sshd\[27484\]: Invalid user randy from 94.191.76.23 Oct 26 12:02:20 hcbbdb sshd\[27484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.76.23 Oct 26 12:02:22 hcbbdb sshd\[27484\]: Failed password for invalid user randy from 94.191.76.23 port 48832 ssh2 Oct 26 12:07:53 hcbbdb sshd\[28099\]: Invalid user elisa from 94.191.76.23 Oct 26 12:07:53 hcbbdb sshd\[28099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.76.23 |
2019-10-26 20:13:12 |
172.81.250.132 | attackspambots | Oct 26 02:00:56 hpm sshd\[13596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.250.132 user=root Oct 26 02:00:58 hpm sshd\[13596\]: Failed password for root from 172.81.250.132 port 54492 ssh2 Oct 26 02:05:41 hpm sshd\[13964\]: Invalid user user from 172.81.250.132 Oct 26 02:05:41 hpm sshd\[13964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.250.132 Oct 26 02:05:43 hpm sshd\[13964\]: Failed password for invalid user user from 172.81.250.132 port 60992 ssh2 |
2019-10-26 20:16:50 |
150.95.110.90 | attack | $f2bV_matches |
2019-10-26 20:03:29 |
31.173.81.12 | attack | Oct 26 13:52:30 mxgate1 postfix/postscreen[30895]: CONNECT from [31.173.81.12]:56966 to [176.31.12.44]:25 Oct 26 13:52:30 mxgate1 postfix/dnsblog[30899]: addr 31.173.81.12 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Oct 26 13:52:30 mxgate1 postfix/dnsblog[30896]: addr 31.173.81.12 listed by domain bl.spamcop.net as 127.0.0.2 Oct 26 13:52:30 mxgate1 postfix/dnsblog[30900]: addr 31.173.81.12 listed by domain b.barracudacentral.org as 127.0.0.2 Oct 26 13:52:30 mxgate1 postfix/dnsblog[30898]: addr 31.173.81.12 listed by domain zen.spamhaus.org as 127.0.0.4 Oct 26 13:52:30 mxgate1 postfix/dnsblog[30897]: addr 31.173.81.12 listed by domain cbl.abuseat.org as 127.0.0.2 Oct 26 13:52:30 mxgate1 postfix/dnsblog[30898]: addr 31.173.81.12 listed by domain zen.spamhaus.org as 127.0.0.11 Oct 26 13:52:36 mxgate1 postfix/postscreen[30895]: DNSBL rank 6 for [31.173.81.12]:56966 Oct x@x Oct 26 13:52:37 mxgate1 postfix/postscreen[30895]: HANGUP after 0.35 from [31.173.81.12]:56966 i........ ------------------------------- |
2019-10-26 20:41:23 |
51.68.174.177 | attack | Oct 26 14:43:55 server sshd\[31785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.ip-51-68-174.eu user=root Oct 26 14:43:57 server sshd\[31785\]: Failed password for root from 51.68.174.177 port 43278 ssh2 Oct 26 15:02:06 server sshd\[4209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.ip-51-68-174.eu user=root Oct 26 15:02:08 server sshd\[4209\]: Failed password for root from 51.68.174.177 port 43710 ssh2 Oct 26 15:05:38 server sshd\[5732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.ip-51-68-174.eu user=root ... |
2019-10-26 20:21:26 |
14.161.16.62 | attack | Oct 26 06:30:47 MK-Soft-Root2 sshd[13653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.16.62 Oct 26 06:30:49 MK-Soft-Root2 sshd[13653]: Failed password for invalid user user from 14.161.16.62 port 38642 ssh2 ... |
2019-10-26 20:01:54 |
37.139.13.105 | attackbots | Oct 26 14:05:42 vps01 sshd[8939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105 Oct 26 14:05:44 vps01 sshd[8939]: Failed password for invalid user ftpuser from 37.139.13.105 port 53346 ssh2 |
2019-10-26 20:16:30 |
106.13.72.95 | attack | Oct 26 14:08:03 mout sshd[25453]: Invalid user mhr from 106.13.72.95 port 41626 |
2019-10-26 20:10:03 |
188.150.173.73 | attack | Oct 26 05:57:03 TORMINT sshd\[7039\]: Invalid user tianya118 from 188.150.173.73 Oct 26 05:57:03 TORMINT sshd\[7039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.150.173.73 Oct 26 05:57:06 TORMINT sshd\[7039\]: Failed password for invalid user tianya118 from 188.150.173.73 port 41632 ssh2 ... |
2019-10-26 20:06:04 |
91.185.236.236 | attack | postfix |
2019-10-26 20:24:27 |
183.88.18.40 | attack | Oct 26 11:20:47 nandi sshd[21599]: reveeclipse mapping checking getaddrinfo for mx-ll-183.88.18-40.dynamic.3bb.in.th [183.88.18.40] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 26 11:20:47 nandi sshd[21599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.88.18.40 user=r.r Oct 26 11:20:49 nandi sshd[21599]: Failed password for r.r from 183.88.18.40 port 33804 ssh2 Oct 26 11:20:50 nandi sshd[21599]: Received disconnect from 183.88.18.40: 11: Bye Bye [preauth] Oct 26 11:42:53 nandi sshd[5620]: reveeclipse mapping checking getaddrinfo for mx-ll-183.88.18-40.dynamic.3bb.in.th [183.88.18.40] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 26 11:42:53 nandi sshd[5620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.88.18.40 user=r.r Oct 26 11:42:56 nandi sshd[5620]: Failed password for r.r from 183.88.18.40 port 57256 ssh2 Oct 26 11:42:56 nandi sshd[5620]: Received disconnect from 183.88.18.40: 11: ........ ------------------------------- |
2019-10-26 20:13:42 |
123.207.167.233 | attackbotsspam | Oct 26 14:05:05 MK-Soft-VM4 sshd[18102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.167.233 Oct 26 14:05:07 MK-Soft-VM4 sshd[18102]: Failed password for invalid user rf from 123.207.167.233 port 60888 ssh2 ... |
2019-10-26 20:38:46 |