City: Töcksfors
Region: Varmlands
Country: Sweden
Internet Service Provider: Telenor
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.248.53.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.248.53.53. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024122501 1800 900 604800 86400
;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 25 19:41:48 CST 2024
;; MSG SIZE rcvd: 106
53.53.248.194.in-addr.arpa domain name pointer 53.53.248.194.static.cust.telenor.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
53.53.248.194.in-addr.arpa name = 53.53.248.194.static.cust.telenor.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 209.97.161.162 | attackspambots | Sep 5 12:36:13 lcprod sshd\[6689\]: Invalid user hadoop from 209.97.161.162 Sep 5 12:36:13 lcprod sshd\[6689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.161.162 Sep 5 12:36:15 lcprod sshd\[6689\]: Failed password for invalid user hadoop from 209.97.161.162 port 55217 ssh2 Sep 5 12:41:29 lcprod sshd\[7213\]: Invalid user user from 209.97.161.162 Sep 5 12:41:29 lcprod sshd\[7213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.161.162 |
2019-09-06 09:13:47 |
| 117.30.74.153 | attackspambots | Sep 5 15:11:33 kapalua sshd\[9138\]: Invalid user chandru from 117.30.74.153 Sep 5 15:11:33 kapalua sshd\[9138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.30.74.153 Sep 5 15:11:35 kapalua sshd\[9138\]: Failed password for invalid user chandru from 117.30.74.153 port 40896 ssh2 Sep 5 15:16:30 kapalua sshd\[9599\]: Invalid user axente from 117.30.74.153 Sep 5 15:16:30 kapalua sshd\[9599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.30.74.153 |
2019-09-06 09:19:41 |
| 218.98.26.178 | attack | Sep 6 03:15:26 minden010 sshd[30555]: Failed password for root from 218.98.26.178 port 50693 ssh2 Sep 6 03:15:29 minden010 sshd[30555]: Failed password for root from 218.98.26.178 port 50693 ssh2 Sep 6 03:15:31 minden010 sshd[30555]: Failed password for root from 218.98.26.178 port 50693 ssh2 ... |
2019-09-06 09:17:03 |
| 88.249.106.18 | attackbots | Automatic report - Port Scan Attack |
2019-09-06 08:55:00 |
| 122.13.0.140 | attackbotsspam | Sep 5 21:59:36 vtv3 sshd\[7937\]: Invalid user ftpadmin from 122.13.0.140 port 55588 Sep 5 21:59:36 vtv3 sshd\[7937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.13.0.140 Sep 5 21:59:37 vtv3 sshd\[7937\]: Failed password for invalid user ftpadmin from 122.13.0.140 port 55588 ssh2 Sep 5 22:03:36 vtv3 sshd\[10320\]: Invalid user weblogic from 122.13.0.140 port 44788 Sep 5 22:03:36 vtv3 sshd\[10320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.13.0.140 Sep 5 22:15:21 vtv3 sshd\[17328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.13.0.140 user=root Sep 5 22:15:23 vtv3 sshd\[17328\]: Failed password for root from 122.13.0.140 port 40630 ssh2 Sep 5 22:19:24 vtv3 sshd\[19370\]: Invalid user test from 122.13.0.140 port 58066 Sep 5 22:19:24 vtv3 sshd\[19370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.1 |
2019-09-06 08:59:05 |
| 103.84.63.6 | attackspambots | Sep 6 03:29:39 areeb-Workstation sshd[31291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.63.6 Sep 6 03:29:41 areeb-Workstation sshd[31291]: Failed password for invalid user 123 from 103.84.63.6 port 56396 ssh2 ... |
2019-09-06 08:46:06 |
| 71.6.135.131 | attackspambots | 09/05/2019-17:47:20.960631 71.6.135.131 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71 |
2019-09-06 09:20:35 |
| 219.143.144.130 | attackspambots | Sep 6 01:44:44 mail postfix/smtpd\[18375\]: warning: unknown\[219.143.144.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 6 01:44:52 mail postfix/smtpd\[18375\]: warning: unknown\[219.143.144.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 6 01:45:05 mail postfix/smtpd\[18375\]: warning: unknown\[219.143.144.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-09-06 08:48:33 |
| 61.42.20.36 | attack | Unauthorized connection attempt from IP address 61.42.20.36 on Port 445(SMB) |
2019-09-06 08:46:59 |
| 202.141.231.18 | attack | Unauthorized connection attempt from IP address 202.141.231.18 on Port 445(SMB) |
2019-09-06 08:33:33 |
| 189.240.82.54 | attack | Unauthorized connection attempt from IP address 189.240.82.54 on Port 445(SMB) |
2019-09-06 08:44:48 |
| 144.168.61.178 | attack | Sep 5 14:22:37 php2 sshd\[29487\]: Invalid user user1 from 144.168.61.178 Sep 5 14:22:37 php2 sshd\[29487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.168.61.178.16clouds.com Sep 5 14:22:39 php2 sshd\[29487\]: Failed password for invalid user user1 from 144.168.61.178 port 35664 ssh2 Sep 5 14:28:35 php2 sshd\[30043\]: Invalid user user1 from 144.168.61.178 Sep 5 14:28:35 php2 sshd\[30043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.168.61.178.16clouds.com |
2019-09-06 08:36:47 |
| 103.121.195.4 | attackspam | Sep 6 00:34:31 MK-Soft-VM4 sshd\[11483\]: Invalid user server from 103.121.195.4 port 40476 Sep 6 00:34:31 MK-Soft-VM4 sshd\[11483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.195.4 Sep 6 00:34:33 MK-Soft-VM4 sshd\[11483\]: Failed password for invalid user server from 103.121.195.4 port 40476 ssh2 ... |
2019-09-06 08:53:07 |
| 80.211.113.144 | attackspambots | Repeated brute force against a port |
2019-09-06 08:35:49 |
| 206.189.190.32 | attack | Sep 6 00:16:23 yabzik sshd[5066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.190.32 Sep 6 00:16:25 yabzik sshd[5066]: Failed password for invalid user test2 from 206.189.190.32 port 52940 ssh2 Sep 6 00:20:40 yabzik sshd[6702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.190.32 |
2019-09-06 08:56:52 |