City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.245.250.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.245.250.102. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:38:09 CST 2025
;; MSG SIZE rcvd: 107
102.250.245.13.in-addr.arpa domain name pointer ec2-13-245-250-102.af-south-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
102.250.245.13.in-addr.arpa name = ec2-13-245-250-102.af-south-1.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
182.123.240.187 | attackspambots | Fail2Ban Ban Triggered |
2019-11-20 01:07:36 |
151.53.100.177 | attack | Website Spammer |
2019-11-20 01:31:32 |
77.102.121.219 | attackspam | firewall-block, port(s): 23/tcp |
2019-11-20 01:38:29 |
119.40.33.22 | attackbots | $f2bV_matches |
2019-11-20 01:13:44 |
202.189.3.253 | attack | Unauthorized connection attempt from IP address 202.189.3.253 on Port 445(SMB) |
2019-11-20 01:28:11 |
46.238.53.245 | attackspambots | Nov 19 11:16:45 askasleikir sshd[19938]: Failed password for invalid user ching from 46.238.53.245 port 35446 ssh2 Nov 19 11:42:04 askasleikir sshd[20085]: Failed password for invalid user home from 46.238.53.245 port 58446 ssh2 Nov 19 11:38:25 askasleikir sshd[20076]: Failed password for invalid user cssserver from 46.238.53.245 port 50022 ssh2 |
2019-11-20 01:49:06 |
222.186.175.183 | attackspam | Nov 19 18:15:10 dedicated sshd[7504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Nov 19 18:15:12 dedicated sshd[7504]: Failed password for root from 222.186.175.183 port 63896 ssh2 |
2019-11-20 01:19:23 |
31.173.27.240 | attackbotsspam | Unauthorized connection attempt from IP address 31.173.27.240 on Port 445(SMB) |
2019-11-20 01:18:27 |
89.139.105.154 | attackbots | firewall-block, port(s): 1433/tcp |
2019-11-20 01:36:19 |
132.148.25.34 | attackspam | Automatic report - XMLRPC Attack |
2019-11-20 01:42:06 |
124.251.110.147 | attackspam | Automatic report - Banned IP Access |
2019-11-20 01:16:06 |
14.63.223.226 | attack | SSH brute-force: detected 9 distinct usernames within a 24-hour window. |
2019-11-20 01:22:41 |
170.233.43.253 | attackbots | Unauthorized connection attempt from IP address 170.233.43.253 on Port 445(SMB) |
2019-11-20 01:13:15 |
177.242.105.174 | attackbotsspam | Unauthorized connection attempt from IP address 177.242.105.174 on Port 445(SMB) |
2019-11-20 01:39:18 |
132.255.70.76 | attack | xmlrpc attack |
2019-11-20 01:37:27 |