City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: MTN
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.47.16.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.47.16.99. IN A
;; AUTHORITY SECTION:
. 157 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022012701 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 28 10:22:53 CST 2022
;; MSG SIZE rcvd: 105
99.16.47.196.in-addr.arpa domain name pointer 196-47-16-99.access.mtnbusiness.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.16.47.196.in-addr.arpa name = 196-47-16-99.access.mtnbusiness.co.za.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.129.33.81 | attackspambots | [MK-Root1] Blocked by UFW |
2020-09-30 16:14:49 |
| 187.174.65.4 | attackbotsspam | sshd: Failed password for invalid user .... from 187.174.65.4 port 59116 ssh2 (2 attempts) |
2020-09-30 17:25:40 |
| 5.45.68.133 | attackspambots | (PERMBLOCK) 5.45.68.133 (NL/Netherlands/-) has had more than 4 temp blocks in the last 86400 secs; Ports: *; Direction: inout; Trigger: LF_PERMBLOCK_COUNT; Logs: |
2020-09-30 16:19:14 |
| 41.33.250.219 | attack | RDPBrutePap24 |
2020-09-30 17:20:52 |
| 109.237.97.128 | attackbots | SpamScore above: 10.0 |
2020-09-30 17:03:34 |
| 45.129.33.15 | attackbots | TCP Port Scanning |
2020-09-30 16:15:54 |
| 45.129.33.129 | attackbots |
|
2020-09-30 16:42:28 |
| 45.129.33.120 | attackspam |
|
2020-09-30 16:13:13 |
| 77.241.49.45 | attackbots | Automatic report - Port Scan Attack |
2020-09-30 17:08:02 |
| 202.131.152.2 | attackspam | Sep 30 08:47:57 Invalid user ts3 from 202.131.152.2 port 47407 |
2020-09-30 17:08:26 |
| 209.198.180.142 | attackspambots | <6 unauthorized SSH connections |
2020-09-30 16:19:47 |
| 45.129.33.123 | attackspam |
|
2020-09-30 16:42:52 |
| 101.89.63.136 | attackbotsspam | Brute%20Force%20SSH |
2020-09-30 17:08:53 |
| 211.197.251.121 | attackspam | $f2bV_matches |
2020-09-30 16:19:31 |
| 223.171.46.146 | attack | sshd: Failed password for invalid user .... from 223.171.46.146 port 1975 ssh2 |
2020-09-30 17:23:22 |