City: Durban
Region: KwaZulu-Natal
Country: South Africa
Internet Service Provider: Telkom
Hostname: unknown
Organization: Telkom-Internet
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.246.31.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42432
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.246.31.91. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051400 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 14 23:51:11 CST 2019
;; MSG SIZE rcvd: 116
91.31.246.41.in-addr.arpa domain name pointer 8ta-246-31-91.telkomadsl.co.za.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
91.31.246.41.in-addr.arpa name = 8ta-246-31-91.telkomadsl.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.176.26.18 | attack | 26.06.2019 06:08:38 Connection to port 6180 blocked by firewall |
2019-06-26 14:40:12 |
77.247.110.166 | attackspambots | SIPVicious Scanner Detection |
2019-06-26 14:55:30 |
78.229.41.247 | attackspam | Jun 26 03:49:43 localhost sshd\[6220\]: Invalid user www from 78.229.41.247 port 55458 Jun 26 03:49:43 localhost sshd\[6220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.229.41.247 Jun 26 03:49:46 localhost sshd\[6220\]: Failed password for invalid user www from 78.229.41.247 port 55458 ssh2 ... |
2019-06-26 14:11:37 |
180.218.96.194 | attackbots | Invalid user user from 180.218.96.194 port 54008 |
2019-06-26 14:06:31 |
192.31.231.241 | attackbotsspam | Bruteforce on SSH Honeypot |
2019-06-26 14:35:25 |
178.62.42.112 | attackspambots | Unauthorised access (Jun 26) SRC=178.62.42.112 LEN=40 TTL=247 ID=15600 TCP DPT=3389 WINDOW=1024 SYN Unauthorised access (Jun 24) SRC=178.62.42.112 LEN=40 TTL=247 ID=31424 TCP DPT=3389 WINDOW=1024 SYN Unauthorised access (Jun 24) SRC=178.62.42.112 LEN=40 TTL=247 ID=21733 TCP DPT=3389 WINDOW=1024 SYN |
2019-06-26 14:44:40 |
88.99.103.29 | attackbotsspam | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-06-26 14:54:06 |
81.22.45.148 | attack | 26.06.2019 07:31:08 Connection to port 33901 blocked by firewall |
2019-06-26 15:39:27 |
185.137.233.226 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-06-26 14:40:52 |
92.119.160.125 | attack | 26.06.2019 04:40:58 Connection to port 2856 blocked by firewall |
2019-06-26 14:52:43 |
209.141.55.73 | attack | Port scan: Attack repeated for 24 hours |
2019-06-26 14:33:03 |
159.65.24.244 | attack | Scanning and Vuln Attempts |
2019-06-26 14:07:32 |
81.22.45.251 | attack | 26.06.2019 07:33:08 Connection to port 5916 blocked by firewall |
2019-06-26 15:38:21 |
123.24.205.99 | attackbotsspam | Unauthorised access (Jun 26) SRC=123.24.205.99 LEN=52 TTL=52 ID=4819 DF TCP DPT=445 WINDOW=8192 SYN |
2019-06-26 14:05:57 |
81.22.45.254 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-06-26 15:38:02 |