City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.242.170.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.242.170.130. IN A
;; AUTHORITY SECTION:
. 548 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 08:45:52 CST 2023
;; MSG SIZE rcvd: 108
130.170.242.105.in-addr.arpa domain name pointer vc-gp-n-105-242-170-130.umts.vodacom.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
130.170.242.105.in-addr.arpa name = vc-gp-n-105-242-170-130.umts.vodacom.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
162.243.138.123 | attack | "Found User-Agent associated with security scanner - Matched Data: zgrab found within REQUEST_HEADERS:User-Agent: mozilla/5.0 zgrab/0.x" |
2020-06-06 03:57:38 |
106.53.72.83 | attack | 2020-06-05T16:11:16.118783abusebot-7.cloudsearch.cf sshd[1540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.72.83 user=root 2020-06-05T16:11:18.946780abusebot-7.cloudsearch.cf sshd[1540]: Failed password for root from 106.53.72.83 port 40296 ssh2 2020-06-05T16:14:11.883198abusebot-7.cloudsearch.cf sshd[1782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.72.83 user=root 2020-06-05T16:14:13.401523abusebot-7.cloudsearch.cf sshd[1782]: Failed password for root from 106.53.72.83 port 38670 ssh2 2020-06-05T16:16:07.025185abusebot-7.cloudsearch.cf sshd[1887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.72.83 user=root 2020-06-05T16:16:09.135520abusebot-7.cloudsearch.cf sshd[1887]: Failed password for root from 106.53.72.83 port 56038 ssh2 2020-06-05T16:17:50.305934abusebot-7.cloudsearch.cf sshd[2024]: pam_unix(sshd:auth): authentication fai ... |
2020-06-06 03:48:08 |
40.121.163.198 | attackbotsspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-06 03:53:28 |
128.14.209.158 | attack |
|
2020-06-06 04:06:36 |
154.221.21.245 | attackspambots | Jun 4 17:38:45 host sshd[14978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.21.245 user=r.r Jun 4 17:38:46 host sshd[14978]: Failed password for r.r from 154.221.21.245 port 46060 ssh2 Jun 4 17:38:46 host sshd[14978]: Received disconnect from 154.221.21.245: 11: Bye Bye [preauth] Jun 4 17:46:53 host sshd[5970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.21.245 user=r.r Jun 4 17:46:55 host sshd[5970]: Failed password for r.r from 154.221.21.245 port 37796 ssh2 Jun 4 17:46:55 host sshd[5970]: Received disconnect from 154.221.21.245: 11: Bye Bye [preauth] Jun 4 17:50:54 host sshd[17382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.21.245 user=r.r Jun 4 17:50:55 host sshd[17382]: Failed password for r.r from 154.221.21.245 port 47382 ssh2 Jun 4 17:50:56 host sshd[17382]: Received disconnect from 154.221.21......... ------------------------------- |
2020-06-06 03:40:52 |
117.121.214.50 | attack | Jun 5 19:43:29 vmi345603 sshd[26184]: Failed password for root from 117.121.214.50 port 49076 ssh2 ... |
2020-06-06 04:12:14 |
92.63.194.35 | attack |
|
2020-06-06 04:10:01 |
125.124.91.247 | attack | Brute-force attempt banned |
2020-06-06 04:00:50 |
223.100.167.105 | attack | Jun 5 20:32:41 sso sshd[17572]: Failed password for root from 223.100.167.105 port 36080 ssh2 ... |
2020-06-06 03:33:25 |
196.246.212.179 | attackspambots | 0,89-00/00 [bc00/m01] PostRequest-Spammer scoring: Dodoma |
2020-06-06 03:52:06 |
106.12.185.161 | attackspambots |
|
2020-06-06 04:04:47 |
112.85.42.89 | attack | Jun 5 22:11:50 ift sshd\[1923\]: Failed password for root from 112.85.42.89 port 51090 ssh2Jun 5 22:13:47 ift sshd\[1980\]: Failed password for root from 112.85.42.89 port 64039 ssh2Jun 5 22:13:50 ift sshd\[1980\]: Failed password for root from 112.85.42.89 port 64039 ssh2Jun 5 22:13:52 ift sshd\[1980\]: Failed password for root from 112.85.42.89 port 64039 ssh2Jun 5 22:16:40 ift sshd\[2496\]: Failed password for root from 112.85.42.89 port 32507 ssh2 ... |
2020-06-06 03:39:43 |
178.175.148.35 | attackbotsspam | Automatic report - Banned IP Access |
2020-06-06 04:06:16 |
216.96.118.182 | attackbots | 2020-06-05T13:56:30.138805+02:00 |
2020-06-06 03:54:34 |
144.217.7.75 | attack | Jun 5 21:19:10 vps639187 sshd\[31880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.7.75 user=root Jun 5 21:19:12 vps639187 sshd\[31880\]: Failed password for root from 144.217.7.75 port 37428 ssh2 Jun 5 21:24:29 vps639187 sshd\[31944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.7.75 user=root ... |
2020-06-06 03:36:11 |