City: Cape Town
Region: Western Cape
Country: South Africa
Internet Service Provider: Vodacom
Hostname: unknown
Organization: VODACOM
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.6.85.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17529
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;41.6.85.89. IN A
;; AUTHORITY SECTION:
. 2688 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051502 1800 900 604800 86400
;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 23:28:57 CST 2019
;; MSG SIZE rcvd: 114
89.85.6.41.in-addr.arpa domain name pointer vc-41-6-85-89.umts.vodacom.co.za.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
89.85.6.41.in-addr.arpa name = vc-41-6-85-89.umts.vodacom.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
123.161.72.3 | attack | 1592827249 - 06/22/2020 14:00:49 Host: 123.161.72.3/123.161.72.3 Port: 445 TCP Blocked |
2020-06-23 04:11:50 |
106.12.5.48 | attackbots | 2020-06-22T22:14:21.114756+02:00 |
2020-06-23 04:21:25 |
213.74.151.130 | attack | Honeypot attack, port: 445, PTR: mail.alturoto.com. |
2020-06-23 03:49:53 |
46.201.25.30 | attackspam | Honeypot attack, port: 445, PTR: 30-25-201-46.pool.ukrtel.net. |
2020-06-23 03:56:09 |
41.228.22.107 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-06-23 04:09:55 |
176.235.179.202 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-06-23 03:57:36 |
183.89.72.227 | attack | Unauthorized connection attempt from IP address 183.89.72.227 on Port 445(SMB) |
2020-06-23 04:01:21 |
52.172.156.159 | attackspam | Jun 22 19:48:36 game-panel sshd[25587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.156.159 Jun 22 19:48:38 game-panel sshd[25587]: Failed password for invalid user pdx from 52.172.156.159 port 33280 ssh2 Jun 22 19:52:41 game-panel sshd[25792]: Failed password for root from 52.172.156.159 port 45564 ssh2 |
2020-06-23 04:09:05 |
218.92.0.184 | attack | Jun 22 22:04:42 santamaria sshd\[14163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184 user=root Jun 22 22:04:43 santamaria sshd\[14163\]: Failed password for root from 218.92.0.184 port 20500 ssh2 Jun 22 22:04:47 santamaria sshd\[14163\]: Failed password for root from 218.92.0.184 port 20500 ssh2 ... |
2020-06-23 04:10:21 |
197.1.88.133 | attackspambots | Email rejected due to spam filtering |
2020-06-23 04:18:43 |
112.200.109.56 | attackspam | 1592827264 - 06/22/2020 14:01:04 Host: 112.200.109.56/112.200.109.56 Port: 445 TCP Blocked |
2020-06-23 03:52:09 |
141.98.80.204 | attackbots | 06/22/2020-14:38:50.931997 141.98.80.204 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-23 04:05:34 |
40.117.211.5 | attack | Unauthorized connection attempt detected from IP address 40.117.211.5 to port 3389 |
2020-06-23 03:53:38 |
51.79.44.52 | attack | Triggered by Fail2Ban at Ares web server |
2020-06-23 04:00:27 |
88.101.168.214 | attackspam | Email rejected due to spam filtering |
2020-06-23 03:58:30 |