City: Lodingen
Region: Nordland
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.19.7.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9889
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.19.7.166.			IN	A
;; AUTHORITY SECTION:
.			188	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 10:27:13 CST 2022
;; MSG SIZE  rcvd: 105166.7.19.194.in-addr.arpa domain name pointer static166.banetele-cust.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
166.7.19.194.in-addr.arpa	name = static166.banetele-cust.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 94.253.215.228 | attack | 2019-01-19 04:04:04 1gkgvS-0004Gs-OD SMTP connection from cpe-94-253-215-228.st2.cable.xnet.hr \[94.253.215.228\]:38252 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-01-19 04:04:29 1gkgvr-0004HL-J2 SMTP connection from cpe-94-253-215-228.st2.cable.xnet.hr \[94.253.215.228\]:38476 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-01-19 04:04:45 1gkgw6-0004Hf-Tg SMTP connection from cpe-94-253-215-228.st2.cable.xnet.hr \[94.253.215.228\]:38592 I=\[193.107.88.166\]:25 closed by DROP in ACL ... | 2019-10-24 23:14:09 | 
| 92.222.79.138 | attackspam | Oct 20 18:50:57 eola sshd[11306]: Invalid user lo from 92.222.79.138 port 54000 Oct 20 18:50:57 eola sshd[11306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.79.138 Oct 20 18:51:00 eola sshd[11306]: Failed password for invalid user lo from 92.222.79.138 port 54000 ssh2 Oct 20 18:51:00 eola sshd[11306]: Received disconnect from 92.222.79.138 port 54000:11: Bye Bye [preauth] Oct 20 18:51:00 eola sshd[11306]: Disconnected from 92.222.79.138 port 54000 [preauth] Oct 20 19:03:20 eola sshd[11480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.79.138 user=r.r Oct 20 19:03:22 eola sshd[11480]: Failed password for r.r from 92.222.79.138 port 56998 ssh2 Oct 20 19:03:22 eola sshd[11480]: Received disconnect from 92.222.79.138 port 56998:11: Bye Bye [preauth] Oct 20 19:03:22 eola sshd[11480]: Disconnected from 92.222.79.138 port 56998 [preauth] Oct 20 19:06:56 eola sshd[11541]: pam........ ------------------------------- | 2019-10-24 23:15:36 | 
| 117.50.45.254 | attack | Invalid user km from 117.50.45.254 port 37018 | 2019-10-24 23:50:42 | 
| 34.87.48.220 | attack | Port Scan: TCP/20000 | 2019-10-24 23:24:31 | 
| 95.54.184.19 | attackspambots | Invalid user admin from 95.54.184.19 port 58312 | 2019-10-24 23:13:13 | 
| 36.72.137.235 | attackbotsspam | ssh failed login | 2019-10-24 23:23:41 | 
| 117.232.127.50 | attackspam | Invalid user postgres from 117.232.127.50 port 39608 | 2019-10-24 23:50:16 | 
| 171.34.166.145 | attack | Invalid user DUP from 171.34.166.145 port 36814 | 2019-10-24 23:37:42 | 
| 221.150.15.200 | attackspambots | Invalid user pi from 221.150.15.200 port 57594 | 2019-10-24 23:27:15 | 
| 78.139.5.47 | attackbotsspam | Invalid user device from 78.139.5.47 port 53278 | 2019-10-24 23:16:30 | 
| 118.32.181.96 | attackspam | Invalid user applmgr from 118.32.181.96 port 59144 | 2019-10-24 23:49:32 | 
| 129.146.149.185 | attackspam | Invalid user admin from 129.146.149.185 port 34672 | 2019-10-24 23:46:27 | 
| 117.50.49.57 | attackspam | Invalid user j0k3r from 117.50.49.57 port 34970 | 2019-10-24 23:50:29 | 
| 45.55.243.124 | attackbots | Invalid user et from 45.55.243.124 port 36628 | 2019-10-24 23:21:15 | 
| 154.92.195.18 | attackbots | Oct 24 16:57:28 vpn01 sshd[19411]: Failed password for root from 154.92.195.18 port 34606 ssh2 ... | 2019-10-24 23:42:03 |