City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.145.123.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.145.123.23.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 00:08:16 CST 2025
;; MSG SIZE  rcvd: 107Host 23.123.145.139.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 23.123.145.139.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 202.137.155.94 | attackbotsspam | Invalid user admin from 202.137.155.94 port 58085 | 2020-04-20 22:21:26 | 
| 14.187.127.172 | attack | Invalid user admin from 14.187.127.172 port 46320 | 2020-04-20 22:10:20 | 
| 61.90.160.216 | attackspam | $f2bV_matches | 2020-04-20 21:58:26 | 
| 213.154.70.102 | attackspam | $f2bV_matches | 2020-04-20 22:18:35 | 
| 223.4.65.77 | attackspam | Apr 20 15:39:28 legacy sshd[16644]: Failed password for root from 223.4.65.77 port 49140 ssh2 Apr 20 15:43:05 legacy sshd[16743]: Failed password for root from 223.4.65.77 port 53446 ssh2 Apr 20 15:46:47 legacy sshd[16885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.4.65.77 ... | 2020-04-20 22:15:09 | 
| 45.95.168.244 | attackbotsspam | Invalid user ubnt from 45.95.168.244 port 59114 | 2020-04-20 22:04:47 | 
| 46.105.148.212 | attackspambots | Apr 20 18:47:25 gw1 sshd[4842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.148.212 Apr 20 18:47:27 gw1 sshd[4842]: Failed password for invalid user test1 from 46.105.148.212 port 35548 ssh2 ... | 2020-04-20 22:04:35 | 
| 64.227.73.193 | attackspambots | scans once in preceeding hours on the ports (in chronological order) 2740 resulting in total of 16 scans from 64.227.0.0/17 block. | 2020-04-20 21:56:36 | 
| 77.211.18.211 | attackbotsspam | Invalid user admin from 77.211.18.211 port 36586 | 2020-04-20 21:54:12 | 
| 186.139.218.8 | attackbots | Apr 20 16:00:57 v22018086721571380 sshd[31553]: Failed password for invalid user ftpuser from 186.139.218.8 port 44109 ssh2 | 2020-04-20 22:29:22 | 
| 45.55.88.16 | attackbots | leo_www | 2020-04-20 22:05:51 | 
| 193.248.60.205 | attack | Invalid user hadoop from 193.248.60.205 port 54940 | 2020-04-20 22:24:51 | 
| 193.112.98.79 | attack | $f2bV_matches | 2020-04-20 22:26:08 | 
| 193.112.143.141 | attack | 2020-04-20T07:43:39.571524linuxbox-skyline sshd[273113]: Invalid user lp from 193.112.143.141 port 54640 ... | 2020-04-20 22:25:37 | 
| 103.74.122.210 | attackbotsspam | Apr 20 12:41:21 XXXXXX sshd[1271]: Invalid user il from 103.74.122.210 port 33014 | 2020-04-20 21:48:59 |