City: Malmo
Region: Skåne
Country: Sweden
Internet Service Provider: Telia
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.218.239.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.218.239.249. IN A
;; AUTHORITY SECTION:
. 457 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400
;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 04:34:20 CST 2019
;; MSG SIZE rcvd: 119
249.239.218.194.in-addr.arpa is an alias for 249.240-28.239.218.194.in-addr.arpa.
249.240-28.239.218.194.in-addr.arpa domain name pointer srv9.mgnsnet.se.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
249.239.218.194.in-addr.arpa canonical name = 249.240-28.239.218.194.in-addr.arpa.
249.240-28.239.218.194.in-addr.arpa name = srv9.mgnsnet.se.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
102.152.18.0 | attackspambots | 5500/tcp [2020-01-31]1pkt |
2020-02-01 07:49:46 |
222.186.175.140 | attackbotsspam | Failed password for root from 222.186.175.140 port 29338 ssh2 Failed password for root from 222.186.175.140 port 29338 ssh2 Failed password for root from 222.186.175.140 port 29338 ssh2 Failed password for root from 222.186.175.140 port 29338 ssh2 |
2020-02-01 07:46:41 |
77.202.192.113 | attack | Invalid user pi from 77.202.192.113 port 56218 |
2020-02-01 07:46:03 |
178.63.120.108 | attackspambots | port 23 |
2020-02-01 07:43:45 |
179.52.9.89 | attackspam | Automatic report - Port Scan Attack |
2020-02-01 07:49:28 |
162.243.128.105 | attackspam | 465/tcp [2020-01-31]1pkt |
2020-02-01 07:50:38 |
45.238.204.10 | attackspambots | 23/tcp [2020-01-31]1pkt |
2020-02-01 08:02:45 |
189.212.98.20 | attackspam | Automatic report - Port Scan Attack |
2020-02-01 07:57:11 |
81.4.123.26 | attackbotsspam | Unauthorized connection attempt detected from IP address 81.4.123.26 to port 2220 [J] |
2020-02-01 08:14:32 |
82.64.129.178 | attack | Unauthorized connection attempt detected from IP address 82.64.129.178 to port 2220 [J] |
2020-02-01 07:48:59 |
222.186.42.155 | attack | Feb 1 00:50:48 mail sshd\[31063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155 user=root Feb 1 00:50:49 mail sshd\[31063\]: Failed password for root from 222.186.42.155 port 24994 ssh2 Feb 1 00:59:27 mail sshd\[31680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155 user=root ... |
2020-02-01 08:09:12 |
181.62.248.12 | attackbotsspam | Invalid user abc123 from 181.62.248.12 port 59100 |
2020-02-01 08:19:39 |
85.209.0.108 | attackspam | 3128/tcp 3128/tcp [2020-01-31]2pkt |
2020-02-01 08:00:37 |
43.243.187.222 | attackspambots | 445/tcp [2020-01-31]1pkt |
2020-02-01 08:10:38 |
119.42.73.130 | attackspambots | 23/tcp [2020-01-31]1pkt |
2020-02-01 07:51:45 |