City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.142.11.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9932
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.142.11.56. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 06:06:34 CST 2025
;; MSG SIZE rcvd: 106
56.11.142.129.in-addr.arpa domain name pointer 129142011056.mbb.telenor.dk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
56.11.142.129.in-addr.arpa name = 129142011056.mbb.telenor.dk.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.38.70.175 | attackspam | Jul 23 21:26:03 dhoomketu sshd[1803719]: Invalid user prince from 51.38.70.175 port 35738 Jul 23 21:26:03 dhoomketu sshd[1803719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.70.175 Jul 23 21:26:03 dhoomketu sshd[1803719]: Invalid user prince from 51.38.70.175 port 35738 Jul 23 21:26:05 dhoomketu sshd[1803719]: Failed password for invalid user prince from 51.38.70.175 port 35738 ssh2 Jul 23 21:30:09 dhoomketu sshd[1803800]: Invalid user gerry from 51.38.70.175 port 48056 ... |
2020-07-24 02:41:27 |
| 45.40.199.82 | attackspambots | Jul 23 21:27:51 lukav-desktop sshd\[10670\]: Invalid user testtest from 45.40.199.82 Jul 23 21:27:51 lukav-desktop sshd\[10670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.82 Jul 23 21:27:54 lukav-desktop sshd\[10670\]: Failed password for invalid user testtest from 45.40.199.82 port 57304 ssh2 Jul 23 21:34:24 lukav-desktop sshd\[10845\]: Invalid user dev from 45.40.199.82 Jul 23 21:34:24 lukav-desktop sshd\[10845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.82 |
2020-07-24 02:42:37 |
| 201.32.178.190 | attackspam | $f2bV_matches |
2020-07-24 02:14:19 |
| 207.194.35.197 | attackspam | Jul 23 20:10:24 prox sshd[15561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.194.35.197 Jul 23 20:10:26 prox sshd[15561]: Failed password for invalid user juju from 207.194.35.197 port 58822 ssh2 |
2020-07-24 02:12:55 |
| 163.172.61.214 | attackspambots | Jul 23 18:16:23 game-panel sshd[2481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.61.214 Jul 23 18:16:25 game-panel sshd[2481]: Failed password for invalid user abc from 163.172.61.214 port 59875 ssh2 Jul 23 18:22:43 game-panel sshd[2824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.61.214 |
2020-07-24 02:32:53 |
| 106.54.111.75 | attackbotsspam | Invalid user school from 106.54.111.75 port 39572 |
2020-07-24 02:08:53 |
| 46.101.139.105 | attack | *Port Scan* detected from 46.101.139.105 (DE/Germany/Hesse/Frankfurt am Main/-). 4 hits in the last 130 seconds |
2020-07-24 02:26:05 |
| 104.248.205.67 | attackbotsspam | Jul 23 19:47:20 nextcloud sshd\[3820\]: Invalid user atb from 104.248.205.67 Jul 23 19:47:20 nextcloud sshd\[3820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67 Jul 23 19:47:22 nextcloud sshd\[3820\]: Failed password for invalid user atb from 104.248.205.67 port 51850 ssh2 |
2020-07-24 02:22:17 |
| 104.223.197.227 | attack | Jul 23 15:18:24 vm1 sshd[23917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.223.197.227 Jul 23 15:18:26 vm1 sshd[23917]: Failed password for invalid user hadoopuser from 104.223.197.227 port 43642 ssh2 ... |
2020-07-24 02:36:54 |
| 43.226.147.239 | attackbots | Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-07-24 02:10:35 |
| 1.56.207.130 | attack | Jul 23 20:22:26 roki sshd[6478]: Invalid user demo from 1.56.207.130 Jul 23 20:22:26 roki sshd[6478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.56.207.130 Jul 23 20:22:29 roki sshd[6478]: Failed password for invalid user demo from 1.56.207.130 port 51970 ssh2 Jul 23 20:29:51 roki sshd[6983]: Invalid user jewel from 1.56.207.130 Jul 23 20:29:51 roki sshd[6983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.56.207.130 ... |
2020-07-24 02:45:27 |
| 210.42.37.150 | attackbots | Invalid user scanner from 210.42.37.150 port 44680 |
2020-07-24 02:12:42 |
| 206.81.12.141 | attackbots | Jul 23 13:45:13 ny01 sshd[10904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.12.141 Jul 23 13:45:15 ny01 sshd[10904]: Failed password for invalid user ftpuser from 206.81.12.141 port 56334 ssh2 Jul 23 13:49:01 ny01 sshd[11318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.12.141 |
2020-07-24 02:13:17 |
| 99.241.71.86 | attackspam | Jul 23 19:23:43 sxvn sshd[197761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.241.71.86 |
2020-07-24 02:23:00 |
| 58.250.44.53 | attackspambots | 2020-07-23T01:02:05.636184hostname sshd[9340]: Invalid user wpc from 58.250.44.53 port 42964 2020-07-23T01:02:07.732963hostname sshd[9340]: Failed password for invalid user wpc from 58.250.44.53 port 42964 ssh2 2020-07-23T01:04:36.509488hostname sshd[12522]: Invalid user 000 from 58.250.44.53 port 58825 ... |
2020-07-24 02:23:54 |