City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.118.25.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22112
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.118.25.158. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030300 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 14:43:56 CST 2025
;; MSG SIZE rcvd: 107
158.25.118.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-118-25-x.hidden-host.tietoevry.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
158.25.118.139.in-addr.arpa name = tietoevry-owned-address-139-118-25-x.hidden-host.tietoevry.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
14.153.79.10 | attackspambots | Oct 1 04:16:12 [host] sshd[2941]: Invalid user ni Oct 1 04:16:12 [host] sshd[2941]: pam_unix(sshd:a Oct 1 04:16:14 [host] sshd[2941]: Failed password |
2020-10-01 12:24:45 |
51.158.112.98 | attack | $f2bV_matches |
2020-10-01 12:15:41 |
189.129.78.19 | attackspambots | WordPress wp-login brute force :: 189.129.78.19 0.060 BYPASS [30/Sep/2020:20:41:44 0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2549 "https://[censored_2]/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" |
2020-10-01 12:28:29 |
197.60.176.182 | attackspam | 23/tcp [2020-09-30]1pkt |
2020-10-01 12:28:01 |
35.207.15.14 | attackspam | SSH brute-force attempt |
2020-10-01 12:07:25 |
216.98.211.118 | attackbotsspam | 445/tcp [2020-09-30]1pkt |
2020-10-01 12:31:25 |
191.232.193.0 | attack | sshguard |
2020-10-01 09:10:18 |
212.70.149.52 | attack | Oct 1 06:17:47 cho postfix/smtpd[3980224]: warning: unknown[212.70.149.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 1 06:18:12 cho postfix/smtpd[3980268]: warning: unknown[212.70.149.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 1 06:18:38 cho postfix/smtpd[3980268]: warning: unknown[212.70.149.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 1 06:19:04 cho postfix/smtpd[3980268]: warning: unknown[212.70.149.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 1 06:19:29 cho postfix/smtpd[3980268]: warning: unknown[212.70.149.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-01 12:22:28 |
138.97.97.44 | attack | 20/9/30@16:41:48: FAIL: Alarm-Network address from=138.97.97.44 20/9/30@16:41:48: FAIL: Alarm-Network address from=138.97.97.44 ... |
2020-10-01 12:21:23 |
34.72.78.90 | attackbots | 20 attempts against mh-ssh on cloud |
2020-10-01 12:09:47 |
196.37.111.106 | attack | Icarus honeypot on github |
2020-10-01 12:34:33 |
106.75.169.106 | attackbotsspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-10-01 12:16:55 |
196.27.127.61 | attackspam | Oct 1 sshd[24086]: Invalid user tms from 196.27.127.61 port 57330 |
2020-10-01 12:25:39 |
190.198.25.34 | attackspambots | 445/tcp [2020-09-30]1pkt |
2020-10-01 12:10:33 |
104.224.187.120 | attackbots | SSH Invalid Login |
2020-10-01 12:26:36 |