City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.244.12.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.244.12.170. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 08:45:07 CST 2023
;; MSG SIZE rcvd: 107
170.12.244.105.in-addr.arpa domain name pointer vc-gp-n-105-244-12-170.umts.vodacom.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
170.12.244.105.in-addr.arpa name = vc-gp-n-105-244-12-170.umts.vodacom.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
198.98.52.100 | attackspam | Jan 3 13:54:21 IngegnereFirenze sshd[5273]: Failed password for invalid user admin from 198.98.52.100 port 56919 ssh2 ... |
2020-01-04 00:39:55 |
185.164.72.42 | attackspam | SSH-bruteforce attempts |
2020-01-04 00:22:20 |
167.86.104.109 | attackspam | Jan 3 16:55:38 www sshd\[148241\]: Invalid user sabin from 167.86.104.109 Jan 3 16:55:38 www sshd\[148241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.104.109 Jan 3 16:55:40 www sshd\[148241\]: Failed password for invalid user sabin from 167.86.104.109 port 36070 ssh2 ... |
2020-01-04 00:08:51 |
165.22.43.33 | attack | Server penetration trying other domain names than server publicly serves (ex https://localhost) |
2020-01-04 00:41:45 |
198.211.120.59 | attackspam | 01/03/2020-17:39:20.012284 198.211.120.59 Protocol: 17 ET INFO Session Traversal Utilities for NAT (STUN Binding Response) |
2020-01-04 00:52:51 |
51.255.35.58 | attack | Jan 3 13:57:35 MainVPS sshd[14537]: Invalid user kral from 51.255.35.58 port 49414 Jan 3 13:57:35 MainVPS sshd[14537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.58 Jan 3 13:57:35 MainVPS sshd[14537]: Invalid user kral from 51.255.35.58 port 49414 Jan 3 13:57:38 MainVPS sshd[14537]: Failed password for invalid user kral from 51.255.35.58 port 49414 ssh2 Jan 3 14:04:06 MainVPS sshd[27230]: Invalid user szl from 51.255.35.58 port 42062 ... |
2020-01-04 00:21:08 |
203.146.170.167 | attack | Jan 3 17:17:20 MK-Soft-VM4 sshd[2252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.146.170.167 Jan 3 17:17:21 MK-Soft-VM4 sshd[2252]: Failed password for invalid user yp from 203.146.170.167 port 54821 ssh2 ... |
2020-01-04 00:19:24 |
51.255.49.92 | attackbots | $f2bV_matches |
2020-01-04 00:35:05 |
183.106.241.27 | attackbots | port scan and connect, tcp 81 (hosts2-ns) |
2020-01-04 00:44:43 |
91.218.210.64 | attack | scan z |
2020-01-04 00:43:07 |
14.239.44.63 | attackspambots | 1578056598 - 01/03/2020 14:03:18 Host: 14.239.44.63/14.239.44.63 Port: 445 TCP Blocked |
2020-01-04 00:53:15 |
51.75.126.115 | attack | [Aegis] @ 2019-01-03 13:03:12 0000 -> Multiple authentication failures. |
2020-01-04 00:49:46 |
103.79.154.104 | attackspam | Repeated brute force against a port |
2020-01-04 00:33:18 |
91.121.222.204 | attackspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-01-04 00:40:42 |
182.43.155.42 | attackbotsspam | Automatic report - SSH Brute-Force Attack |
2020-01-04 00:25:47 |