City: unknown
Region: unknown
Country: Denmark
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.45.58.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.45.58.96. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 09:39:03 CST 2025
;; MSG SIZE rcvd: 105
96.58.45.139.in-addr.arpa domain name pointer 139-45-58-96.norlyscustomer.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
96.58.45.139.in-addr.arpa name = 139-45-58-96.norlyscustomer.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 93.119.155.153 | attack | Sep 6 20:04:42 site2 sshd\[41839\]: Invalid user vbox from 93.119.155.153Sep 6 20:04:44 site2 sshd\[41839\]: Failed password for invalid user vbox from 93.119.155.153 port 34900 ssh2Sep 6 20:09:29 site2 sshd\[42438\]: Invalid user admin from 93.119.155.153Sep 6 20:09:30 site2 sshd\[42438\]: Failed password for invalid user admin from 93.119.155.153 port 51850 ssh2Sep 6 20:14:22 site2 sshd\[43080\]: Invalid user ts3bot from 93.119.155.153Sep 6 20:14:24 site2 sshd\[43080\]: Failed password for invalid user ts3bot from 93.119.155.153 port 40558 ssh2 ... |
2019-09-07 01:28:49 |
| 37.49.227.202 | attackbots | firewall-block, port(s): 81/tcp |
2019-09-07 00:27:48 |
| 167.71.217.12 | attackspam | Sep 6 20:25:21 www sshd\[145079\]: Invalid user password321 from 167.71.217.12 Sep 6 20:25:21 www sshd\[145079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.12 Sep 6 20:25:24 www sshd\[145079\]: Failed password for invalid user password321 from 167.71.217.12 port 52614 ssh2 ... |
2019-09-07 01:36:01 |
| 144.139.165.13 | attackspambots | Automatic report - Port Scan Attack |
2019-09-07 02:01:17 |
| 93.43.13.178 | attack | Chat Spam |
2019-09-07 01:10:44 |
| 93.97.217.81 | attackspambots | Sep 6 18:51:22 h2177944 sshd\[20270\]: Invalid user user from 93.97.217.81 port 53932 Sep 6 18:51:22 h2177944 sshd\[20270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.97.217.81 Sep 6 18:51:24 h2177944 sshd\[20270\]: Failed password for invalid user user from 93.97.217.81 port 53932 ssh2 Sep 6 19:20:54 h2177944 sshd\[21713\]: Invalid user mcserver from 93.97.217.81 port 48887 ... |
2019-09-07 01:46:24 |
| 187.104.133.51 | attack | Honeypot attack, port: 23, PTR: bb688533.virtua.com.br. |
2019-09-07 01:03:48 |
| 203.45.45.241 | attack | Automatic report - Banned IP Access |
2019-09-07 01:28:11 |
| 49.88.112.78 | attackbots | Sep 6 19:06:17 legacy sshd[4734]: Failed password for root from 49.88.112.78 port 40791 ssh2 Sep 6 19:06:20 legacy sshd[4737]: Failed password for root from 49.88.112.78 port 55899 ssh2 Sep 6 19:06:20 legacy sshd[4734]: Failed password for root from 49.88.112.78 port 40791 ssh2 ... |
2019-09-07 01:21:31 |
| 51.144.228.148 | attackspambots | Chat Spam |
2019-09-07 01:30:21 |
| 192.210.203.101 | attackbotsspam | Sep 6 17:12:45 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=192.210.203.101 DST=109.74.200.221 LEN=57 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=UDP SPT=53690 DPT=123 LEN=37 ... |
2019-09-07 00:14:14 |
| 207.154.194.16 | attack | Sep 6 18:20:29 mail sshd\[16233\]: Failed password for invalid user 123456 from 207.154.194.16 port 53302 ssh2 Sep 6 18:25:09 mail sshd\[16683\]: Invalid user p@ssw0rd from 207.154.194.16 port 40290 Sep 6 18:25:09 mail sshd\[16683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.194.16 Sep 6 18:25:11 mail sshd\[16683\]: Failed password for invalid user p@ssw0rd from 207.154.194.16 port 40290 ssh2 Sep 6 18:29:59 mail sshd\[17169\]: Invalid user 123 from 207.154.194.16 port 55514 Sep 6 18:29:59 mail sshd\[17169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.194.16 |
2019-09-07 00:39:09 |
| 218.98.26.173 | attackbotsspam | Sep 6 19:12:38 h2177944 sshd\[21505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.173 user=root Sep 6 19:12:41 h2177944 sshd\[21505\]: Failed password for root from 218.98.26.173 port 23013 ssh2 Sep 6 19:12:43 h2177944 sshd\[21505\]: Failed password for root from 218.98.26.173 port 23013 ssh2 Sep 6 19:12:46 h2177944 sshd\[21505\]: Failed password for root from 218.98.26.173 port 23013 ssh2 ... |
2019-09-07 01:16:10 |
| 94.249.39.212 | attackspam | Honeypot attack, port: 23, PTR: 94.249.x.212.go.com.jo. |
2019-09-07 00:27:28 |
| 125.139.180.128 | attackspam | Sep 6 16:09:36 albuquerque sshd\[7412\]: User root from 125.139.180.128 not allowed because not listed in AllowUsersSep 6 16:09:37 albuquerque sshd\[7415\]: User root from 125.139.180.128 not allowed because not listed in AllowUsersSep 6 16:09:38 albuquerque sshd\[7412\]: Failed password for invalid user root from 125.139.180.128 port 45367 ssh2 ... |
2019-09-07 01:01:11 |