City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.232.138.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55233
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.232.138.194. IN A
;; AUTHORITY SECTION:
. 213 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:02:28 CST 2022
;; MSG SIZE rcvd: 108
194.138.232.129.in-addr.arpa domain name pointer dedi733.jnb2.host-h.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
194.138.232.129.in-addr.arpa name = dedi733.jnb2.host-h.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
138.68.94.173 | attackbotsspam | $f2bV_matches_ltvn |
2020-02-26 11:23:32 |
185.176.27.114 | attackspambots | firewall-block, port(s): 21/tcp |
2020-02-26 11:26:11 |
95.233.114.25 | attackspambots | Automatic report - Port Scan Attack |
2020-02-26 11:18:04 |
106.13.123.29 | attackbots | Feb 26 03:51:26 jane sshd[14155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.123.29 Feb 26 03:51:29 jane sshd[14155]: Failed password for invalid user compose from 106.13.123.29 port 41600 ssh2 ... |
2020-02-26 11:20:47 |
203.81.69.164 | attackbots | 4243/tcp [2020-02-26]1pkt |
2020-02-26 11:33:57 |
174.250.144.173 | spambotsattackproxynormal | People can stay of my Facebook |
2020-02-26 11:22:37 |
188.54.142.37 | attack | Automatic report - Port Scan Attack |
2020-02-26 11:26:52 |
69.163.250.195 | attackspambots | Automatically reported by fail2ban report script (mx1) |
2020-02-26 11:12:29 |
152.195.12.171 | attackspambots | ET INFO TLS Handshake Failure |
2020-02-26 11:05:39 |
124.74.248.218 | attackspambots | Feb 25 23:48:04 vps46666688 sshd[15123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218 Feb 25 23:48:05 vps46666688 sshd[15123]: Failed password for invalid user sysbackup from 124.74.248.218 port 44632 ssh2 ... |
2020-02-26 11:24:40 |
77.39.73.85 | attack | Automatic report - Port Scan Attack |
2020-02-26 11:21:11 |
200.90.190.68 | attackspambots | Feb 25 23:17:20 server sshd\[30370\]: Invalid user pos from 200.90.190.68 Feb 25 23:17:20 server sshd\[30370\]: Failed none for invalid user pos from 200.90.190.68 port 36872 ssh2 Feb 26 01:29:58 server sshd\[23635\]: Invalid user downloader from 200.90.190.68 Feb 26 01:29:58 server sshd\[23635\]: Failed none for invalid user downloader from 200.90.190.68 port 40383 ssh2 Feb 26 03:44:59 server sshd\[21388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-90-190-68.static.tie.cl user=root ... |
2020-02-26 10:59:14 |
174.250.144.173 | spambotsattackproxynormal | People can stay of my Facebook |
2020-02-26 11:21:58 |
80.211.139.159 | attackbotsspam | Feb 26 04:14:31 ns381471 sshd[23787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.139.159 Feb 26 04:14:33 ns381471 sshd[23787]: Failed password for invalid user samba from 80.211.139.159 port 45690 ssh2 |
2020-02-26 11:22:34 |
206.81.16.240 | attackbots | Feb 26 03:44:53 silence02 sshd[23613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.16.240 Feb 26 03:44:55 silence02 sshd[23613]: Failed password for invalid user sdco from 206.81.16.240 port 40716 ssh2 Feb 26 03:53:47 silence02 sshd[27454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.16.240 |
2020-02-26 11:19:00 |