City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.241.55.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.241.55.253. IN A
;; AUTHORITY SECTION:
. 240 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010600 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 21:25:34 CST 2022
;; MSG SIZE rcvd: 107
253.55.241.129.in-addr.arpa domain name pointer dhcp-055253.fa-s.ntnu.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
253.55.241.129.in-addr.arpa name = dhcp-055253.fa-s.ntnu.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 78.188.105.52 | attackbots | Automatic report - Port Scan Attack |
2019-11-12 23:51:49 |
| 222.186.169.194 | attackbotsspam | SSH brutforce |
2019-11-12 23:56:14 |
| 37.49.231.159 | attackbots | Unauthorised access (Nov 12) SRC=37.49.231.159 LEN=40 TTL=52 ID=36062 TCP DPT=8080 WINDOW=38130 SYN Unauthorised access (Nov 12) SRC=37.49.231.159 LEN=40 TTL=52 ID=6285 TCP DPT=8080 WINDOW=38130 SYN Unauthorised access (Nov 12) SRC=37.49.231.159 LEN=40 TTL=52 ID=22885 TCP DPT=8080 WINDOW=38130 SYN Unauthorised access (Nov 12) SRC=37.49.231.159 LEN=40 TTL=52 ID=49965 TCP DPT=8080 WINDOW=15896 SYN Unauthorised access (Nov 11) SRC=37.49.231.159 LEN=40 TTL=52 ID=36181 TCP DPT=8080 WINDOW=38130 SYN Unauthorised access (Nov 11) SRC=37.49.231.159 LEN=40 TTL=52 ID=13382 TCP DPT=8080 WINDOW=15896 SYN |
2019-11-13 00:22:24 |
| 90.224.11.107 | attackbots | Automatic report - XMLRPC Attack |
2019-11-13 00:19:03 |
| 188.35.187.50 | attackspam | Nov 12 16:42:01 MK-Soft-Root1 sshd[31851]: Failed password for root from 188.35.187.50 port 39068 ssh2 ... |
2019-11-13 00:02:22 |
| 59.25.197.158 | attack | 2019-11-12T16:23:50.059396stark.klein-stark.info sshd\[21089\]: Invalid user w from 59.25.197.158 port 56142 2019-11-12T16:23:50.127069stark.klein-stark.info sshd\[21089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.158 2019-11-12T16:23:51.915647stark.klein-stark.info sshd\[21089\]: Failed password for invalid user w from 59.25.197.158 port 56142 ssh2 ... |
2019-11-13 00:24:40 |
| 222.231.62.157 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-11-12 23:55:37 |
| 109.202.138.236 | attackbots | SMTP_hacking |
2019-11-12 23:57:12 |
| 223.223.188.226 | attack | 2019-11-12T15:54:53.529429abusebot-8.cloudsearch.cf sshd\[31819\]: Invalid user http from 223.223.188.226 port 50659 |
2019-11-13 00:13:53 |
| 45.136.110.0 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-12 23:52:51 |
| 42.238.191.73 | attackspambots | Honeypot attack, port: 23, PTR: hn.kd.ny.adsl. |
2019-11-13 00:20:33 |
| 118.193.31.20 | attack | Nov 12 16:41:58 minden010 sshd[6398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.20 Nov 12 16:42:00 minden010 sshd[6398]: Failed password for invalid user jj1231234 from 118.193.31.20 port 34658 ssh2 Nov 12 16:47:06 minden010 sshd[8086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.31.20 ... |
2019-11-13 00:07:07 |
| 104.131.58.179 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2019-11-13 00:13:39 |
| 95.183.71.207 | attack | port scan and connect, tcp 23 (telnet) |
2019-11-13 00:00:11 |
| 91.207.40.44 | attackspam | Nov 12 16:47:53 vps691689 sshd[2166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.44 Nov 12 16:47:55 vps691689 sshd[2166]: Failed password for invalid user janbjarne from 91.207.40.44 port 54716 ssh2 ... |
2019-11-13 00:21:30 |