City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: Evry Norge As
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.118.187.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5821
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.118.187.112. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 22:51:01 CST 2019
;; MSG SIZE rcvd: 119
Host 112.187.118.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 112.187.118.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
178.76.69.132 | attackbots | email spam |
2019-12-19 21:54:52 |
168.194.83.18 | attackbotsspam | email spam |
2019-12-19 21:56:20 |
50.253.211.61 | attack | email spam |
2019-12-19 22:05:32 |
103.110.89.148 | attackbotsspam | $f2bV_matches |
2019-12-19 22:23:27 |
218.90.198.56 | attackspam | Unauthorised access (Dec 19) SRC=218.90.198.56 LEN=52 TTL=115 ID=8850 DF TCP DPT=1433 WINDOW=8192 SYN |
2019-12-19 22:17:57 |
222.186.180.223 | attack | Dec 19 15:20:02 ns381471 sshd[16767]: Failed password for root from 222.186.180.223 port 5234 ssh2 Dec 19 15:20:17 ns381471 sshd[16767]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 5234 ssh2 [preauth] |
2019-12-19 22:26:32 |
167.249.170.26 | attackspam | email spam |
2019-12-19 21:56:45 |
1.215.162.195 | attack | email spam |
2019-12-19 22:08:18 |
177.86.181.210 | attackbots | email spam |
2019-12-19 22:10:25 |
50.247.207.5 | attack | Sending SPAM email |
2019-12-19 22:06:00 |
31.42.254.24 | attackbotsspam | email spam |
2019-12-19 21:45:06 |
91.230.154.221 | attack | email spam |
2019-12-19 22:02:27 |
31.29.99.230 | attackspam | email spam |
2019-12-19 21:45:30 |
159.89.165.36 | attackbots | Dec 19 09:46:59 ws12vmsma01 sshd[10102]: Invalid user packet from 159.89.165.36 Dec 19 09:47:01 ws12vmsma01 sshd[10102]: Failed password for invalid user packet from 159.89.165.36 port 39140 ssh2 Dec 19 09:55:26 ws12vmsma01 sshd[11223]: Invalid user 888888 from 159.89.165.36 ... |
2019-12-19 22:16:51 |
189.112.125.212 | attack | email spam |
2019-12-19 21:52:41 |