City: Al
Region: Buskerud
Country: Norway
Internet Service Provider: Telenor
Hostname: unknown
Organization: Telenor Norge AS
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.150.242.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57291
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.150.242.109. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019060100 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 23:50:04 CST 2019
;; MSG SIZE rcvd: 117
109.242.150.2.in-addr.arpa has no PTR record
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
109.242.150.2.in-addr.arpa name = 2.150.242.109.tmi.telenormobil.no.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
120.133.236.138 | attack | Unauthorized connection attempt detected from IP address 120.133.236.138 to port 2220 [J] |
2020-02-03 13:57:51 |
103.207.11.7 | attack | Feb 3 07:00:12 localhost sshd\[20013\]: Invalid user anta from 103.207.11.7 port 42980 Feb 3 07:00:12 localhost sshd\[20013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.7 Feb 3 07:00:14 localhost sshd\[20013\]: Failed password for invalid user anta from 103.207.11.7 port 42980 ssh2 |
2020-02-03 14:15:12 |
146.88.240.4 | attack | 4 Attack(s) Detected [DoS Attack: TCP/UDP Chargen] from source: 146.88.240.4, port 44104, Saturday, February 01, 2020 16:38:12 [DoS Attack: TCP/UDP Chargen] from source: 146.88.240.4, port 58279, Saturday, February 01, 2020 16:35:09 [DoS Attack: TCP/UDP Chargen] from source: 146.88.240.4, port 34386, Saturday, February 01, 2020 16:34:41 [DoS Attack: TCP/UDP Chargen] from source: 146.88.240.4, port 35753, Friday, January 31, 2020 16:38:17 |
2020-02-03 14:13:20 |
151.235.126.125 | attack | 1580705649 - 02/03/2020 05:54:09 Host: 151.235.126.125/151.235.126.125 Port: 445 TCP Blocked |
2020-02-03 14:04:07 |
145.239.95.241 | attackbots | Feb 3 10:16:44 gw1 sshd[1157]: Failed password for root from 145.239.95.241 port 45468 ssh2 ... |
2020-02-03 13:31:35 |
193.32.163.112 | attack | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-02-03 14:00:09 |
51.83.73.160 | attack | Feb 3 06:20:23 legacy sshd[12873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.73.160 Feb 3 06:20:25 legacy sshd[12873]: Failed password for invalid user weblogic from 51.83.73.160 port 54500 ssh2 Feb 3 06:23:23 legacy sshd[13158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.73.160 ... |
2020-02-03 13:42:46 |
2.187.26.138 | attack | POST /editBlackAndWhiteList HTTP/1.1n 400 10106 - |
2020-02-03 13:39:56 |
125.160.233.173 | attackspambots | Unauthorized connection attempt detected from IP address 125.160.233.173 to port 2220 [J] |
2020-02-03 14:12:44 |
14.141.174.123 | attack | Feb 3 05:51:38 rotator sshd\[20838\]: Address 14.141.174.123 maps to 14.141.174.123.static-vsnl.net.in, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Feb 3 05:51:38 rotator sshd\[20838\]: Invalid user guai123 from 14.141.174.123Feb 3 05:51:40 rotator sshd\[20838\]: Failed password for invalid user guai123 from 14.141.174.123 port 39238 ssh2Feb 3 05:54:17 rotator sshd\[20850\]: Address 14.141.174.123 maps to 14.141.174.123.static-vsnl.net.in, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Feb 3 05:54:17 rotator sshd\[20850\]: Invalid user 1234 from 14.141.174.123Feb 3 05:54:19 rotator sshd\[20850\]: Failed password for invalid user 1234 from 14.141.174.123 port 48223 ssh2 ... |
2020-02-03 13:54:19 |
189.114.33.112 | attack | Automatic report - Port Scan Attack |
2020-02-03 14:03:33 |
198.143.155.138 | attackspambots | Unauthorized connection attempt detected from IP address 198.143.155.138 to port 1723 [J] |
2020-02-03 13:52:14 |
198.211.104.28 | attack | POST User-Agent: Mozilla/5.0 400 10087 - |
2020-02-03 14:01:11 |
2.179.123.171 | attack | POST /editBlackAndWhiteList HTTP/1.1 400 10125 curl/7.29.0 |
2020-02-03 13:48:43 |
36.155.113.223 | attackbotsspam | Feb 3 06:04:07 game-panel sshd[17236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.223 Feb 3 06:04:09 game-panel sshd[17236]: Failed password for invalid user fse from 36.155.113.223 port 50356 ssh2 Feb 3 06:07:11 game-panel sshd[17372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.223 |
2020-02-03 14:08:57 |