City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.116.231.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.116.231.23. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:20:42 CST 2025
;; MSG SIZE rcvd: 107
23.231.116.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-116-231-x.hidden-host.tietoevry.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
23.231.116.139.in-addr.arpa name = tietoevry-owned-address-139-116-231-x.hidden-host.tietoevry.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 217.182.165.158 | attack | Jan 27 22:35:03 vtv3 sshd\[25306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.165.158 user=postfix Jan 27 22:35:05 vtv3 sshd\[25306\]: Failed password for postfix from 217.182.165.158 port 52864 ssh2 Jan 27 22:39:11 vtv3 sshd\[26436\]: Invalid user ftpuser from 217.182.165.158 port 58436 Jan 27 22:39:11 vtv3 sshd\[26436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.165.158 Jan 27 22:39:13 vtv3 sshd\[26436\]: Failed password for invalid user ftpuser from 217.182.165.158 port 58436 ssh2 Feb 14 09:47:08 vtv3 sshd\[4592\]: Invalid user vivek from 217.182.165.158 port 58810 Feb 14 09:47:08 vtv3 sshd\[4592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.165.158 Feb 14 09:47:10 vtv3 sshd\[4592\]: Failed password for invalid user vivek from 217.182.165.158 port 58810 ssh2 Feb 14 09:52:02 vtv3 sshd\[5951\]: Invalid user ts3server from 217.182.165.158 po |
2019-07-30 03:10:00 |
| 220.94.205.218 | attackbots | SSH Brute-Force reported by Fail2Ban |
2019-07-30 03:09:16 |
| 170.130.187.22 | attackspambots | Automatic report - Port Scan Attack |
2019-07-30 02:52:36 |
| 195.242.235.219 | attackspam | Jul 29 19:22:52 offspring postfix/smtpd[29760]: warning: hostname host-195.242.235.219.c3.net.pl does not resolve to address 195.242.235.219: Name or service not known Jul 29 19:22:52 offspring postfix/smtpd[29760]: connect from unknown[195.242.235.219] Jul 29 19:22:53 offspring postfix/smtpd[29760]: warning: unknown[195.242.235.219]: SASL CRAM-MD5 authentication failed: authentication failure Jul 29 19:22:53 offspring postfix/smtpd[29760]: warning: unknown[195.242.235.219]: SASL PLAIN authentication failed: authentication failure Jul 29 19:22:54 offspring postfix/smtpd[29760]: warning: unknown[195.242.235.219]: SASL LOGIN authentication failed: authentication failure ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=195.242.235.219 |
2019-07-30 02:28:24 |
| 45.55.12.248 | attack | Jul 29 19:52:22 vmd17057 sshd\[22808\]: Invalid user test from 45.55.12.248 port 36448 Jul 29 19:52:22 vmd17057 sshd\[22808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248 Jul 29 19:52:24 vmd17057 sshd\[22808\]: Failed password for invalid user test from 45.55.12.248 port 36448 ssh2 ... |
2019-07-30 02:30:00 |
| 90.153.35.46 | attackspam | Lines containing failures of 90.153.35.46 Jul 29 19:27:50 omfg postfix/smtpd[11105]: connect from dyndsl-090-153-035-046-teleos.ewe-ip-backbone.de[90.153.35.46] Jul x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=90.153.35.46 |
2019-07-30 02:56:20 |
| 165.22.238.97 | attackbots | 23/tcp [2019-07-29]1pkt |
2019-07-30 02:36:39 |
| 180.126.237.38 | attack | 20 attempts against mh-ssh on pluto.magehost.pro |
2019-07-30 02:54:25 |
| 37.49.230.216 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2019-07-30 03:04:33 |
| 104.206.128.66 | attackspam | Honeypot attack, port: 23, PTR: 66-128.206.104.serverhubrdns.in-addr.arpa. |
2019-07-30 02:49:59 |
| 168.195.46.53 | attackspam | Currently 7 failed/unauthorized logins attempts via SMTP/IMAP whostnameh 7 different usernames and wrong password: 2019-07-29T19:28:39+02:00 x@x 2019-07-27T20:17:34+02:00 x@x 2019-07-27T20:09:29+02:00 x@x 2019-07-23T22:51:52+02:00 x@x 2019-07-18T19:09:44+02:00 x@x 2019-07-07T13:46:02+02:00 x@x 2019-07-07T07:37:15+02:00 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=168.195.46.53 |
2019-07-30 03:14:58 |
| 162.243.46.161 | attackspambots | Jul 29 20:45:59 bouncer sshd\[3972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.46.161 user=root Jul 29 20:46:01 bouncer sshd\[3972\]: Failed password for root from 162.243.46.161 port 48392 ssh2 Jul 29 20:50:34 bouncer sshd\[3979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.46.161 user=root ... |
2019-07-30 02:58:12 |
| 91.34.234.109 | attackspam | Jul 29 19:25:06 h2027339 sshd[8981]: Invalid user pi from 91.34.234.109 Jul 29 19:25:15 h2027339 sshd[8983]: Invalid user pi from 91.34.234.109 Jul 29 19:25:18 h2027339 sshd[8985]: Invalid user pi from 91.34.234.109 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=91.34.234.109 |
2019-07-30 02:41:39 |
| 34.77.116.135 | attackspambots | POP3 |
2019-07-30 02:48:09 |
| 206.189.198.6 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-07-30 02:30:17 |