City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.121.19.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.121.19.197. IN A
;; AUTHORITY SECTION:
. 562 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020090600 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 06 18:55:26 CST 2020
;; MSG SIZE rcvd: 118
197.19.121.148.in-addr.arpa domain name pointer 197.19.121.148.in-addr.arpa.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
197.19.121.148.in-addr.arpa name = 197.19.121.148.in-addr.arpa.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
123.207.178.45 | attackbots | SSH/22 MH Probe, BF, Hack - |
2020-06-05 19:30:07 |
73.41.104.30 | attack | Jun 5 09:53:26 XXX sshd[5006]: Invalid user solr from 73.41.104.30 port 41316 |
2020-06-05 19:14:14 |
140.143.226.19 | attackbots | SSH Brute-Force attacks |
2020-06-05 19:11:11 |
118.25.87.27 | attack | Jun 4 21:11:51 pixelmemory sshd[783257]: Failed password for root from 118.25.87.27 port 56576 ssh2 Jun 4 21:16:35 pixelmemory sshd[813736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.87.27 user=root Jun 4 21:16:37 pixelmemory sshd[813736]: Failed password for root from 118.25.87.27 port 49960 ssh2 Jun 4 21:21:25 pixelmemory sshd[818999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.87.27 user=root Jun 4 21:21:26 pixelmemory sshd[818999]: Failed password for root from 118.25.87.27 port 43342 ssh2 ... |
2020-06-05 19:08:57 |
65.49.20.66 | attack | ... |
2020-06-05 19:17:28 |
107.6.183.226 | attackspam | Unauthorized connection attempt detected from IP address 107.6.183.226 to port 8001 |
2020-06-05 18:52:04 |
54.38.55.136 | attack | 2020-06-05T12:54:22.046838rocketchat.forhosting.nl sshd[5051]: Failed password for root from 54.38.55.136 port 57216 ssh2 2020-06-05T12:58:19.573349rocketchat.forhosting.nl sshd[5096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.55.136 user=root 2020-06-05T12:58:22.313201rocketchat.forhosting.nl sshd[5096]: Failed password for root from 54.38.55.136 port 60872 ssh2 ... |
2020-06-05 19:24:48 |
77.42.85.15 | attackspambots | Automatic report - Port Scan Attack |
2020-06-05 19:24:04 |
122.51.176.111 | attack | Jun 5 06:49:11 hosting sshd[13053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.176.111 user=root Jun 5 06:49:12 hosting sshd[13053]: Failed password for root from 122.51.176.111 port 42368 ssh2 ... |
2020-06-05 19:23:22 |
87.197.137.176 | attackspam | firewall-block, port(s): 8080/tcp |
2020-06-05 18:51:52 |
209.97.168.205 | attackbotsspam | Jun 5 05:42:26 vmd26974 sshd[13285]: Failed password for root from 209.97.168.205 port 50544 ssh2 ... |
2020-06-05 19:19:30 |
51.91.134.227 | attack | $f2bV_matches |
2020-06-05 19:19:44 |
45.14.150.103 | attackbots | $f2bV_matches |
2020-06-05 19:21:28 |
196.52.43.92 | attackspambots |
|
2020-06-05 19:08:36 |
103.149.192.6 | attack | firewall-block, port(s): 443/tcp |
2020-06-05 18:51:29 |