City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.189.51.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.189.51.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 04:06:17 CST 2025
;; MSG SIZE rcvd: 106
21.51.189.109.in-addr.arpa domain name pointer 21.51.189.109.customer.cdi.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.51.189.109.in-addr.arpa name = 21.51.189.109.customer.cdi.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 121.122.28.221 | attackbotsspam | SSH Bruteforce Attack |
2019-07-07 21:03:07 |
| 188.162.43.224 | attack | Rude login attack (10 tries in 1d) |
2019-07-07 21:13:15 |
| 5.196.72.58 | attackspambots | 07.07.2019 12:53:53 SSH access blocked by firewall |
2019-07-07 21:19:58 |
| 110.74.163.90 | attack | Jul 7 05:33:03 heissa sshd\[31583\]: Invalid user fctrserver from 110.74.163.90 port 46088 Jul 7 05:33:03 heissa sshd\[31583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.74.163.90 Jul 7 05:33:05 heissa sshd\[31583\]: Failed password for invalid user fctrserver from 110.74.163.90 port 46088 ssh2 Jul 7 05:37:58 heissa sshd\[32039\]: Invalid user target from 110.74.163.90 port 39336 Jul 7 05:37:58 heissa sshd\[32039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.74.163.90 |
2019-07-07 21:36:57 |
| 150.109.196.143 | attackbots | Jul 7 08:04:53 dev sshd\[14109\]: Invalid user teste from 150.109.196.143 port 39016 Jul 7 08:04:53 dev sshd\[14109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.196.143 ... |
2019-07-07 21:14:14 |
| 106.13.15.122 | attackspam | Jul 5 21:20:20 tuxlinux sshd[1624]: Invalid user simon from 106.13.15.122 port 54540 Jul 5 21:20:20 tuxlinux sshd[1624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.15.122 Jul 5 21:20:20 tuxlinux sshd[1624]: Invalid user simon from 106.13.15.122 port 54540 Jul 5 21:20:20 tuxlinux sshd[1624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.15.122 Jul 5 21:20:20 tuxlinux sshd[1624]: Invalid user simon from 106.13.15.122 port 54540 Jul 5 21:20:20 tuxlinux sshd[1624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.15.122 Jul 5 21:20:22 tuxlinux sshd[1624]: Failed password for invalid user simon from 106.13.15.122 port 54540 ssh2 ... |
2019-07-07 21:05:03 |
| 37.202.66.185 | attackspambots | [portscan] tcp/23 [TELNET] [scan/connect: 3 time(s)] *(RWIN=60871)(07070954) |
2019-07-07 21:49:46 |
| 134.175.176.160 | attackbots | Jul 7 06:49:04 heissa sshd\[7685\]: Invalid user jason from 134.175.176.160 port 34394 Jul 7 06:49:04 heissa sshd\[7685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.176.160 Jul 7 06:49:06 heissa sshd\[7685\]: Failed password for invalid user jason from 134.175.176.160 port 34394 ssh2 Jul 7 06:52:32 heissa sshd\[8085\]: Invalid user cactiuser from 134.175.176.160 port 46870 Jul 7 06:52:32 heissa sshd\[8085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.176.160 |
2019-07-07 21:23:46 |
| 77.247.108.131 | attack | Jul 7 10:39:11 mail kernel: [1295069.532489] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=77.247.108.131 DST=77.73.69.240 LEN=442 TOS=0x08 PREC=0x20 TTL=55 ID=36584 DF PROTO=UDP SPT=5449 DPT=3090 LEN=422 Jul 7 10:39:11 mail kernel: [1295069.532549] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=77.247.108.131 DST=77.73.69.240 LEN=444 TOS=0x08 PREC=0x20 TTL=55 ID=36585 DF PROTO=UDP SPT=5449 DPT=3100 LEN=424 Jul 7 10:39:11 mail kernel: [1295069.532564] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=77.247.108.131 DST=77.73.69.240 LEN=441 TOS=0x08 PREC=0x20 TTL=55 ID=36586 DF PROTO=UDP SPT=5449 DPT=3110 LEN=421 Jul 7 10:39:11 mail kernel: [1295069.532583] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=77.247.108.131 DST=77.73.69.240 LEN=443 TOS=0x08 PREC=0x20 TTL=55 ID=36587 DF PROTO=UDP SPT=5449 DPT=3120 LEN=423 Jul 7 10:39:11 mail kernel: [1295069.532682] [UFW BLOCK] IN=eth0 OUT= MAC=00:16 |
2019-07-07 21:49:02 |
| 191.53.199.200 | attackspambots | Jul 6 22:39:23 mailman postfix/smtpd[3601]: warning: unknown[191.53.199.200]: SASL PLAIN authentication failed: authentication failure |
2019-07-07 21:09:57 |
| 67.43.2.61 | attackspambots | 07.07.2019 05:39:18 - Wordpress fail Detected by ELinOX-ALM |
2019-07-07 21:13:44 |
| 178.150.216.229 | attack | Jul 7 05:32:49 ip-172-31-1-72 sshd\[9528\]: Invalid user vijay from 178.150.216.229 Jul 7 05:32:49 ip-172-31-1-72 sshd\[9528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229 Jul 7 05:32:51 ip-172-31-1-72 sshd\[9528\]: Failed password for invalid user vijay from 178.150.216.229 port 38340 ssh2 Jul 7 05:38:05 ip-172-31-1-72 sshd\[9599\]: Invalid user client1 from 178.150.216.229 Jul 7 05:38:05 ip-172-31-1-72 sshd\[9599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.150.216.229 |
2019-07-07 21:40:55 |
| 206.189.76.227 | attackbots | Jul 7 09:08:43 Proxmox sshd\[9293\]: Invalid user arturo from 206.189.76.227 port 54940 Jul 7 09:08:43 Proxmox sshd\[9293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.76.227 Jul 7 09:08:45 Proxmox sshd\[9293\]: Failed password for invalid user arturo from 206.189.76.227 port 54940 ssh2 Jul 7 09:13:41 Proxmox sshd\[16077\]: Invalid user jf from 206.189.76.227 port 56304 Jul 7 09:13:41 Proxmox sshd\[16077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.76.227 Jul 7 09:13:43 Proxmox sshd\[16077\]: Failed password for invalid user jf from 206.189.76.227 port 56304 ssh2 |
2019-07-07 21:44:25 |
| 182.112.208.203 | attack | Honeypot attack, port: 23, PTR: hn.kd.ny.adsl. |
2019-07-07 21:49:27 |
| 119.28.73.77 | attackspam | Fail2Ban Ban Triggered |
2019-07-07 21:43:35 |