City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.157.238.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60781
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.157.238.93. IN A
;; AUTHORITY SECTION:
. 60 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:48:31 CST 2022
;; MSG SIZE rcvd: 107
93.238.157.193.in-addr.arpa domain name pointer eduroam-193-157-238-93.wlan.uio.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
93.238.157.193.in-addr.arpa name = eduroam-193-157-238-93.wlan.uio.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 177.220.133.158 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-13T06:22:22Z and 2020-10-13T06:30:42Z |
2020-10-13 16:26:02 |
| 201.151.62.150 | attackbotsspam | Unauthorized connection attempt from IP address 201.151.62.150 on Port 445(SMB) |
2020-10-13 16:34:41 |
| 110.185.104.126 | attack | Oct 13 17:13:55 web1 sshd[7964]: Invalid user brian from 110.185.104.126 port 38324 Oct 13 17:13:55 web1 sshd[7964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.104.126 Oct 13 17:13:55 web1 sshd[7964]: Invalid user brian from 110.185.104.126 port 38324 Oct 13 17:13:57 web1 sshd[7964]: Failed password for invalid user brian from 110.185.104.126 port 38324 ssh2 Oct 13 17:44:41 web1 sshd[18539]: Invalid user test from 110.185.104.126 port 53144 Oct 13 17:44:41 web1 sshd[18539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.104.126 Oct 13 17:44:41 web1 sshd[18539]: Invalid user test from 110.185.104.126 port 53144 Oct 13 17:44:43 web1 sshd[18539]: Failed password for invalid user test from 110.185.104.126 port 53144 ssh2 Oct 13 17:49:26 web1 sshd[20107]: Invalid user lisa from 110.185.104.126 port 51420 ... |
2020-10-13 16:17:48 |
| 45.116.112.22 | attackbots | Invalid user arun from 45.116.112.22 port 51498 |
2020-10-13 16:23:45 |
| 193.112.108.135 | attackspam | Invalid user sharp from 193.112.108.135 port 40040 |
2020-10-13 16:14:23 |
| 82.130.201.15 | attack | Oct 13 10:16:52 db sshd[14251]: Invalid user horiuchi from 82.130.201.15 port 37822 ... |
2020-10-13 16:31:15 |
| 46.163.32.30 | attackbotsspam | Automatic report - Port Scan Attack |
2020-10-13 16:33:30 |
| 146.59.172.66 | attack | 13.10.2020 01:15:43 - Wordpress fail Detected by ELinOX-ALM |
2020-10-13 16:37:48 |
| 82.193.145.123 | attackbotsspam | Oct 13 07:25:15 staging sshd[24127]: Invalid user huawei from 82.193.145.123 port 44250 Oct 13 07:25:15 staging sshd[24127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.193.145.123 Oct 13 07:25:15 staging sshd[24127]: Invalid user huawei from 82.193.145.123 port 44250 Oct 13 07:25:17 staging sshd[24127]: Failed password for invalid user huawei from 82.193.145.123 port 44250 ssh2 ... |
2020-10-13 16:28:11 |
| 109.125.137.170 | attackspambots | $lgm |
2020-10-13 16:23:15 |
| 139.255.86.19 | attackbots | Unauthorized connection attempt detected from IP address 139.255.86.19 to port 445 [T] |
2020-10-13 16:26:36 |
| 183.6.107.68 | attackbotsspam | [SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically. |
2020-10-13 16:43:04 |
| 103.220.76.197 | attackspambots | Unauthorized connection attempt from IP address 103.220.76.197 on Port 445(SMB) |
2020-10-13 16:44:11 |
| 218.92.0.145 | attackspam | Oct 13 09:55:49 prod4 sshd\[30665\]: Failed password for root from 218.92.0.145 port 40038 ssh2 Oct 13 09:55:52 prod4 sshd\[30665\]: Failed password for root from 218.92.0.145 port 40038 ssh2 Oct 13 09:55:56 prod4 sshd\[30665\]: Failed password for root from 218.92.0.145 port 40038 ssh2 ... |
2020-10-13 16:45:20 |
| 119.29.143.201 | attack | SSH login attempts. |
2020-10-13 16:27:09 |