City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.143.45.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.143.45.158. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:50:12 CST 2025
;; MSG SIZE rcvd: 107
158.45.143.194.in-addr.arpa domain name pointer 158.45.143.194.static.cust.telenor.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
158.45.143.194.in-addr.arpa name = 158.45.143.194.static.cust.telenor.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.89.12.184 | attackbots | Port scan: Attack repeated for 24 hours |
2020-06-28 07:46:50 |
| 159.203.45.210 | attackspambots | 159.203.45.210 - - [28/Jun/2020:00:18:41 +0100] "POST /wp-login.php HTTP/1.1" 200 1968 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.203.45.210 - - [28/Jun/2020:00:18:43 +0100] "POST /wp-login.php HTTP/1.1" 200 1972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.203.45.210 - - [28/Jun/2020:00:18:43 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-06-28 07:25:03 |
| 183.109.79.253 | attackbotsspam | 2020-06-27T23:16:46.041317abusebot-3.cloudsearch.cf sshd[28407]: Invalid user jessica from 183.109.79.253 port 62616 2020-06-27T23:16:46.046719abusebot-3.cloudsearch.cf sshd[28407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.79.253 2020-06-27T23:16:46.041317abusebot-3.cloudsearch.cf sshd[28407]: Invalid user jessica from 183.109.79.253 port 62616 2020-06-27T23:16:47.765700abusebot-3.cloudsearch.cf sshd[28407]: Failed password for invalid user jessica from 183.109.79.253 port 62616 ssh2 2020-06-27T23:19:29.495987abusebot-3.cloudsearch.cf sshd[28418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.79.253 user=root 2020-06-27T23:19:31.591436abusebot-3.cloudsearch.cf sshd[28418]: Failed password for root from 183.109.79.253 port 61831 ssh2 2020-06-27T23:20:21.175667abusebot-3.cloudsearch.cf sshd[28422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos ... |
2020-06-28 07:39:39 |
| 222.186.175.182 | attackbotsspam | Jun 28 00:48:15 santamaria sshd\[17542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root Jun 28 00:48:17 santamaria sshd\[17542\]: Failed password for root from 222.186.175.182 port 38458 ssh2 Jun 28 00:48:33 santamaria sshd\[17544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root ... |
2020-06-28 07:12:09 |
| 152.136.141.254 | attackspam | Jun 27 16:04:09 propaganda sshd[44443]: Connection from 152.136.141.254 port 55378 on 10.0.0.160 port 22 rdomain "" Jun 27 16:04:09 propaganda sshd[44443]: Connection closed by 152.136.141.254 port 55378 [preauth] |
2020-06-28 07:25:47 |
| 212.70.149.50 | attackspambots | Exim brute force attack (multiple auth failures). |
2020-06-28 07:31:26 |
| 13.65.198.40 | attackspam | Invalid user postgres from 13.65.198.40 port 51064 |
2020-06-28 07:11:34 |
| 103.123.65.35 | attackbotsspam | 2020-06-27T23:26:26.096285abusebot-3.cloudsearch.cf sshd[28515]: Invalid user user3 from 103.123.65.35 port 54202 2020-06-27T23:26:26.102459abusebot-3.cloudsearch.cf sshd[28515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.65.35 2020-06-27T23:26:26.096285abusebot-3.cloudsearch.cf sshd[28515]: Invalid user user3 from 103.123.65.35 port 54202 2020-06-27T23:26:28.112268abusebot-3.cloudsearch.cf sshd[28515]: Failed password for invalid user user3 from 103.123.65.35 port 54202 ssh2 2020-06-27T23:29:12.417337abusebot-3.cloudsearch.cf sshd[28676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.65.35 user=root 2020-06-27T23:29:14.883780abusebot-3.cloudsearch.cf sshd[28676]: Failed password for root from 103.123.65.35 port 34270 ssh2 2020-06-27T23:31:47.519713abusebot-3.cloudsearch.cf sshd[28837]: Invalid user rcesd from 103.123.65.35 port 42540 ... |
2020-06-28 07:33:12 |
| 193.70.0.173 | attackbotsspam | Jun 28 00:12:36 mail sshd[48319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.0.173 Jun 28 00:12:38 mail sshd[48319]: Failed password for invalid user hydra from 193.70.0.173 port 58772 ssh2 ... |
2020-06-28 07:18:12 |
| 106.75.7.92 | attack | Jun 28 00:15:33 server sshd[24424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.7.92 Jun 28 00:15:35 server sshd[24424]: Failed password for invalid user admin from 106.75.7.92 port 47136 ssh2 Jun 28 00:34:54 server sshd[25242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.7.92 user=root Jun 28 00:34:56 server sshd[25242]: Failed password for invalid user root from 106.75.7.92 port 43322 ssh2 |
2020-06-28 07:34:02 |
| 221.249.140.17 | attackspam | Invalid user splunk from 221.249.140.17 port 44452 |
2020-06-28 07:24:49 |
| 46.174.191.30 | attackspam | TCP port 8080: Scan and connection |
2020-06-28 07:39:01 |
| 168.181.51.140 | attackbotsspam | Jun 26 20:04:41 xxx sshd[5776]: Failed password for r.r from 168.181.51.140 port 62756 ssh2 Jun 26 20:08:59 xxx sshd[5989]: Failed password for r.r from 168.181.51.140 port 35600 ssh2 Jun 26 20:13:54 xxx sshd[6735]: Invalid user nexus from 168.181.51.140 Jun 26 20:13:57 xxx sshd[6735]: Failed password for invalid user nexus from 168.181.51.140 port 23672 ssh2 Jun 26 20:24:47 xxx sshd[7268]: Invalid user zls from 168.181.51.140 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=168.181.51.140 |
2020-06-28 07:23:44 |
| 198.211.116.79 | attack | Jun 28 01:43:50 pkdns2 sshd\[28011\]: Invalid user itadmin from 198.211.116.79Jun 28 01:43:52 pkdns2 sshd\[28011\]: Failed password for invalid user itadmin from 198.211.116.79 port 37774 ssh2Jun 28 01:46:59 pkdns2 sshd\[28160\]: Invalid user openhab from 198.211.116.79Jun 28 01:47:01 pkdns2 sshd\[28160\]: Failed password for invalid user openhab from 198.211.116.79 port 37236 ssh2Jun 28 01:50:14 pkdns2 sshd\[28349\]: Failed password for root from 198.211.116.79 port 36692 ssh2Jun 28 01:53:31 pkdns2 sshd\[28473\]: Invalid user admin from 198.211.116.79 ... |
2020-06-28 07:10:58 |
| 78.128.113.166 | attackbots | 1 attempts against mh-modsecurity-ban on milky |
2020-06-28 07:35:13 |