City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.179.215.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.179.215.74. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012001 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 13:22:32 CST 2025
;; MSG SIZE rcvd: 107
74.215.179.109.in-addr.arpa domain name pointer 109.179.215.74.tmi.telenormobil.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
74.215.179.109.in-addr.arpa name = 109.179.215.74.tmi.telenormobil.no.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
13.93.32.11 | attack | GET /remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession |
2019-11-11 23:35:02 |
62.231.7.221 | attackbotsspam | 2019-11-11T15:52:26.111548abusebot-4.cloudsearch.cf sshd\[20228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.231.7.221 user=root |
2019-11-11 23:56:18 |
206.81.4.235 | attackspam | Nov 11 14:54:43 hcbbdb sshd\[16287\]: Invalid user edcrfv from 206.81.4.235 Nov 11 14:54:43 hcbbdb sshd\[16287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.4.235 Nov 11 14:54:45 hcbbdb sshd\[16287\]: Failed password for invalid user edcrfv from 206.81.4.235 port 53168 ssh2 Nov 11 14:58:44 hcbbdb sshd\[16718\]: Invalid user windowsnt from 206.81.4.235 Nov 11 14:58:44 hcbbdb sshd\[16718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.4.235 |
2019-11-12 00:07:37 |
142.93.235.47 | attackbotsspam | SSH Brute Force, server-1 sshd[3220]: Failed password for invalid user sadayuki from 142.93.235.47 port 47852 ssh2 |
2019-11-12 00:11:18 |
222.186.190.92 | attackbotsspam | Nov 11 12:51:39 firewall sshd[7081]: Failed password for root from 222.186.190.92 port 3160 ssh2 Nov 11 12:51:50 firewall sshd[7081]: error: maximum authentication attempts exceeded for root from 222.186.190.92 port 3160 ssh2 [preauth] Nov 11 12:51:50 firewall sshd[7081]: Disconnecting: Too many authentication failures [preauth] ... |
2019-11-11 23:56:38 |
186.225.101.2 | attackspam | Unauthorized connection attempt from IP address 186.225.101.2 on Port 445(SMB) |
2019-11-11 23:54:04 |
195.16.41.171 | attack | SSH Brute Force, server-1 sshd[3206]: Failed password for root from 195.16.41.171 port 52692 ssh2 |
2019-11-12 00:08:42 |
128.199.133.249 | attack | 2019-11-11T16:05:41.035856abusebot-2.cloudsearch.cf sshd\[22897\]: Invalid user pos from 128.199.133.249 port 52538 |
2019-11-12 00:18:36 |
5.88.155.130 | attackspam | SSH Brute Force, server-1 sshd[4017]: Failed password for invalid user oracle from 5.88.155.130 port 50890 ssh2 |
2019-11-12 00:03:18 |
152.136.72.17 | attackbotsspam | SSH Brute Force, server-1 sshd[4646]: Failed password for invalid user Kaija from 152.136.72.17 port 42320 ssh2 |
2019-11-11 23:59:56 |
43.243.12.62 | attack | Unauthorized connection attempt from IP address 43.243.12.62 on Port 445(SMB) |
2019-11-11 23:50:45 |
134.175.55.178 | attackbots | Nov 11 15:18:14 h2034429 sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.55.178 user=r.r Nov 11 15:18:16 h2034429 sshd[2102]: Failed password for r.r from 134.175.55.178 port 54636 ssh2 Nov 11 15:18:17 h2034429 sshd[2102]: Received disconnect from 134.175.55.178 port 54636:11: Bye Bye [preauth] Nov 11 15:18:17 h2034429 sshd[2102]: Disconnected from 134.175.55.178 port 54636 [preauth] Nov 11 15:29:12 h2034429 sshd[2241]: Invalid user www from 134.175.55.178 Nov 11 15:29:12 h2034429 sshd[2241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.55.178 Nov 11 15:29:15 h2034429 sshd[2241]: Failed password for invalid user www from 134.175.55.178 port 59472 ssh2 Nov 11 15:29:15 h2034429 sshd[2241]: Received disconnect from 134.175.55.178 port 59472:11: Bye Bye [preauth] Nov 11 15:29:15 h2034429 sshd[2241]: Disconnected from 134.175.55.178 port 59472 [preauth] Nov 11 15:3........ ------------------------------- |
2019-11-11 23:48:46 |
157.230.92.254 | attackspam | 157.230.92.254 - - \[11/Nov/2019:15:44:57 +0100\] "POST /wp-login.php HTTP/1.0" 200 5224 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 157.230.92.254 - - \[11/Nov/2019:15:45:04 +0100\] "POST /wp-login.php HTTP/1.0" 200 5039 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 157.230.92.254 - - \[11/Nov/2019:15:45:14 +0100\] "POST /wp-login.php HTTP/1.0" 200 5036 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-11-11 23:48:29 |
81.30.177.40 | attackbots | Unauthorized connection attempt from IP address 81.30.177.40 on Port 445(SMB) |
2019-11-11 23:44:43 |
212.224.118.25 | attackbots | SSH Brute Force, server-1 sshd[3044]: Failed password for invalid user guest from 212.224.118.25 port 43404 ssh2 |
2019-11-12 00:06:43 |