City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.120.177.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.120.177.28. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 22:15:07 CST 2025
;; MSG SIZE rcvd: 107
28.177.120.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-120-177-x.hidden-host.tietoevry.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
28.177.120.139.in-addr.arpa name = tietoevry-owned-address-139-120-177-x.hidden-host.tietoevry.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.244.75.244 | attack | Dec 19 06:32:39 hpm sshd\[3769\]: Invalid user admin from 104.244.75.244 Dec 19 06:32:39 hpm sshd\[3769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.75.244 Dec 19 06:32:41 hpm sshd\[3769\]: Failed password for invalid user admin from 104.244.75.244 port 39758 ssh2 Dec 19 06:38:49 hpm sshd\[4365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.75.244 user=news Dec 19 06:38:51 hpm sshd\[4365\]: Failed password for news from 104.244.75.244 port 46626 ssh2 |
2019-12-20 00:55:02 |
| 123.231.61.180 | attackbots | SSH bruteforce |
2019-12-20 01:01:21 |
| 138.197.162.32 | attack | $f2bV_matches |
2019-12-20 00:59:36 |
| 186.46.24.253 | attackspam | Sex spam-Kazachstán Return-Path: |
2019-12-20 01:34:31 |
| 106.51.78.188 | attackbotsspam | SSH bruteforce |
2019-12-20 01:28:53 |
| 81.30.177.40 | attack | Unauthorized connection attempt detected from IP address 81.30.177.40 to port 445 |
2019-12-20 01:31:56 |
| 201.250.155.199 | attackbotsspam | Automatic report - Port Scan Attack |
2019-12-20 01:20:45 |
| 167.114.226.137 | attack | Dec 19 22:24:50 gw1 sshd[30143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137 Dec 19 22:24:52 gw1 sshd[30143]: Failed password for invalid user huwe from 167.114.226.137 port 35407 ssh2 ... |
2019-12-20 01:29:25 |
| 200.105.215.122 | attackbotsspam | Attempt to log in with non-existing username "admin" /wp-login.php |
2019-12-20 01:05:24 |
| 106.13.31.93 | attackspambots | 2019-12-19T14:28:12.264612shield sshd\[26764\]: Invalid user yositami from 106.13.31.93 port 38542 2019-12-19T14:28:12.268775shield sshd\[26764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.31.93 2019-12-19T14:28:14.438340shield sshd\[26764\]: Failed password for invalid user yositami from 106.13.31.93 port 38542 ssh2 2019-12-19T14:36:32.023027shield sshd\[30155\]: Invalid user apache from 106.13.31.93 port 59720 2019-12-19T14:36:32.027434shield sshd\[30155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.31.93 |
2019-12-20 01:31:15 |
| 93.148.181.194 | attackspambots | SSH bruteforce |
2019-12-20 01:33:00 |
| 125.128.140.114 | attackspam | Dec 19 15:36:52 grey postfix/smtpd\[15051\]: NOQUEUE: reject: RCPT from unknown\[125.128.140.114\]: 554 5.7.1 Service unavailable\; Client host \[125.128.140.114\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[125.128.140.114\]\; from=\ |
2019-12-20 01:13:23 |
| 91.121.136.44 | attackspambots | Dec 19 12:00:15 ny01 sshd[13365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.136.44 Dec 19 12:00:17 ny01 sshd[13365]: Failed password for invalid user cynergy1 from 91.121.136.44 port 55328 ssh2 Dec 19 12:05:27 ny01 sshd[13832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.136.44 |
2019-12-20 01:11:57 |
| 103.84.192.242 | attackspam | Dec 19 18:01:56 srv01 sshd[28553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.192.242 user=root Dec 19 18:01:58 srv01 sshd[28553]: Failed password for root from 103.84.192.242 port 40658 ssh2 Dec 19 18:08:45 srv01 sshd[29105]: Invalid user charpentier from 103.84.192.242 port 49612 Dec 19 18:08:45 srv01 sshd[29105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.192.242 Dec 19 18:08:45 srv01 sshd[29105]: Invalid user charpentier from 103.84.192.242 port 49612 Dec 19 18:08:46 srv01 sshd[29105]: Failed password for invalid user charpentier from 103.84.192.242 port 49612 ssh2 ... |
2019-12-20 01:10:30 |
| 185.53.88.104 | attack | 12/19/2019-17:40:16.881446 185.53.88.104 Protocol: 17 ET SCAN Sipvicious Scan |
2019-12-20 01:11:05 |