City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.242.7.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.242.7.34. IN A
;; AUTHORITY SECTION:
. 443 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 16:40:02 CST 2022
;; MSG SIZE rcvd: 105
34.7.242.105.in-addr.arpa domain name pointer vc-gp-n-105-242-7-34.umts.vodacom.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.7.242.105.in-addr.arpa name = vc-gp-n-105-242-7-34.umts.vodacom.co.za.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 105.242.68.202 | attack | Unauthorized connection attempt detected from IP address 105.242.68.202 to port 23 |
2020-07-30 16:39:08 |
| 222.252.194.235 | attackspambots | SMB Server BruteForce Attack |
2020-07-30 17:03:20 |
| 88.87.88.236 | attackspam | Automatic report - Port Scan Attack |
2020-07-30 17:10:56 |
| 58.54.249.210 | attack | $f2bV_matches |
2020-07-30 17:10:02 |
| 160.153.235.106 | attackspam | (sshd) Failed SSH login from 160.153.235.106 (US/United States/ip-160-153-235-106.ip.secureserver.net): 10 in the last 3600 secs |
2020-07-30 16:48:30 |
| 36.133.48.222 | attackbots | SSH Brute Force |
2020-07-30 16:43:18 |
| 94.177.201.50 | attack | Failed password for invalid user zhup from 94.177.201.50 port 53450 ssh2 |
2020-07-30 17:08:04 |
| 201.218.215.106 | attackspambots | SSH Brute-Force. Ports scanning. |
2020-07-30 17:04:50 |
| 70.50.196.21 | attackbots | 70.50.196.21 - - [30/Jul/2020:05:36:45 +0100] "POST /wp-login.php HTTP/1.1" 200 6170 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" 70.50.196.21 - - [30/Jul/2020:05:46:50 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" 70.50.196.21 - - [30/Jul/2020:05:46:51 +0100] "POST /wp-login.php HTTP/1.1" 200 6170 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" ... |
2020-07-30 17:09:05 |
| 180.166.117.254 | attackspambots | SSH Brute Force |
2020-07-30 16:47:27 |
| 112.172.147.34 | attackbots | (sshd) Failed SSH login from 112.172.147.34 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 30 10:20:34 srv sshd[31391]: Invalid user fd from 112.172.147.34 port 15484 Jul 30 10:20:37 srv sshd[31391]: Failed password for invalid user fd from 112.172.147.34 port 15484 ssh2 Jul 30 10:25:17 srv sshd[31551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.172.147.34 user=root Jul 30 10:25:19 srv sshd[31551]: Failed password for root from 112.172.147.34 port 31833 ssh2 Jul 30 10:29:46 srv sshd[31726]: Invalid user lcreary from 112.172.147.34 port 45980 |
2020-07-30 17:00:23 |
| 103.199.52.59 | attackbots | SMB Server BruteForce Attack |
2020-07-30 16:58:51 |
| 43.240.103.153 | attack | Brute forcing RDP port 3389 |
2020-07-30 16:35:28 |
| 183.101.8.110 | attack | Jul 30 10:27:03 |
2020-07-30 16:44:01 |
| 116.127.106.194 | attack | 3389BruteforceStormFW21 |
2020-07-30 17:06:35 |