City: Mossel Bay
Region: Western Cape
Country: South Africa
Internet Service Provider: Telkom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.227.118.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.227.118.53. IN A
;; AUTHORITY SECTION:
. 578 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022032202 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 23 08:17:22 CST 2022
;; MSG SIZE rcvd: 107
53.118.227.105.in-addr.arpa domain name pointer 105-227-118-53.south.dsl.telkomsa.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
53.118.227.105.in-addr.arpa name = 105-227-118-53.south.dsl.telkomsa.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
182.19.85.20 | attack |
|
2020-06-01 03:35:10 |
80.82.77.240 | attack | firewall-block, port(s): 1241/tcp, 1293/tcp |
2020-06-01 03:44:35 |
154.16.171.186 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-01 03:35:55 |
103.18.246.184 | attack | Port scanning [2 denied] |
2020-06-01 03:38:40 |
88.218.17.185 | attackbots | Port scanning [2 denied] |
2020-06-01 03:42:44 |
159.89.133.144 | attackbotsspam | Port scan denied |
2020-06-01 03:15:38 |
80.82.77.212 | attack | Port scanning [6 denied] |
2020-06-01 03:45:13 |
120.132.13.151 | attack | May 31 15:36:45 pkdns2 sshd\[4622\]: Invalid user karsan from 120.132.13.151May 31 15:36:47 pkdns2 sshd\[4622\]: Failed password for invalid user karsan from 120.132.13.151 port 45252 ssh2May 31 15:39:55 pkdns2 sshd\[4731\]: Invalid user ot from 120.132.13.151May 31 15:39:57 pkdns2 sshd\[4731\]: Failed password for invalid user ot from 120.132.13.151 port 49746 ssh2May 31 15:46:24 pkdns2 sshd\[5216\]: Invalid user zeenat from 120.132.13.151May 31 15:46:26 pkdns2 sshd\[5216\]: Failed password for invalid user zeenat from 120.132.13.151 port 58738 ssh2 ... |
2020-06-01 03:21:11 |
177.139.194.62 | attackspam | 2020-05-31T19:44:45.675492centos sshd[21229]: Failed password for root from 177.139.194.62 port 50298 ssh2 2020-05-31T19:46:21.567560centos sshd[21333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.194.62 user=root 2020-05-31T19:46:23.515006centos sshd[21333]: Failed password for root from 177.139.194.62 port 43206 ssh2 ... |
2020-06-01 03:12:41 |
185.16.37.135 | attackbots | SSH Brute Force |
2020-06-01 03:11:21 |
190.52.191.49 | attackspambots | SSH Brute Force |
2020-06-01 03:10:17 |
151.77.198.27 | attackspambots | ET EXPLOIT Zyxel NAS RCE Attempt Inbound (CVE-2020-9054) M1 - port: 80 proto: TCP cat: Attempted Administrator Privilege Gain |
2020-06-01 03:36:21 |
195.54.166.138 | attack | Persistent port scanning [21 denied] |
2020-06-01 03:32:41 |
118.123.96.139 | attackbots | 1433/tcp 1433/tcp [2020-05-28/31]2pkt |
2020-06-01 03:37:15 |
103.83.157.39 | attackbotsspam |
|
2020-06-01 03:38:08 |