City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.45.81.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;31.45.81.114.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 18:46:01 CST 2025
;; MSG SIZE  rcvd: 105114.81.45.31.in-addr.arpa domain name pointer 114.81.45.31.customer.cdi.no.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
114.81.45.31.in-addr.arpa	name = 114.81.45.31.customer.cdi.no.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 109.123.117.239 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - | 2019-11-16 00:07:07 | 
| 190.202.19.26 | attackspambots | Unauthorized connection attempt from IP address 190.202.19.26 on Port 445(SMB) | 2019-11-15 23:27:30 | 
| 159.65.27.252 | attack | Masscan Port Scanning Tool Detection | 2019-11-15 23:30:12 | 
| 222.186.180.17 | attack | Nov 15 16:59:22 dedicated sshd[18956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Nov 15 16:59:24 dedicated sshd[18956]: Failed password for root from 222.186.180.17 port 20856 ssh2 | 2019-11-15 23:59:43 | 
| 117.203.90.87 | attackspam | Unauthorized connection attempt from IP address 117.203.90.87 on Port 445(SMB) | 2019-11-15 23:40:49 | 
| 180.200.238.86 | attackbotsspam | scan z | 2019-11-15 23:54:12 | 
| 118.101.192.81 | attackbots | detected by Fail2Ban | 2019-11-15 23:36:02 | 
| 115.66.65.112 | attack | Brute force attempt | 2019-11-15 23:47:48 | 
| 210.14.77.102 | attackspambots | Nov 15 14:42:08 v22018086721571380 sshd[1762]: Failed password for invalid user buyitemadjusthistory from 210.14.77.102 port 20898 ssh2 Nov 15 15:45:04 v22018086721571380 sshd[5553]: Failed password for invalid user 11111 from 210.14.77.102 port 4538 ssh2 | 2019-11-15 23:50:32 | 
| 91.13.240.103 | attackspambots | Scanning | 2019-11-15 23:44:59 | 
| 59.56.74.165 | attackbots | Nov 8 06:27:26 microserver sshd[46388]: Invalid user 19v8y from 59.56.74.165 port 40072 Nov 8 06:27:26 microserver sshd[46388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.56.74.165 Nov 8 06:27:28 microserver sshd[46388]: Failed password for invalid user 19v8y from 59.56.74.165 port 40072 ssh2 Nov 8 06:32:06 microserver sshd[47041]: Invalid user fuwuqiNet! from 59.56.74.165 port 58148 Nov 8 06:32:06 microserver sshd[47041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.56.74.165 Nov 15 15:47:58 microserver sshd[60435]: Invalid user yerly from 59.56.74.165 port 35948 Nov 15 15:47:58 microserver sshd[60435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.56.74.165 Nov 15 15:48:01 microserver sshd[60435]: Failed password for invalid user yerly from 59.56.74.165 port 35948 ssh2 Nov 15 15:52:52 microserver sshd[61113]: Invalid user future from 59.56.74.165 port 53650 Nov 15 1 | 2019-11-15 23:57:09 | 
| 106.225.129.108 | attack | Nov 15 15:38:59 sso sshd[16014]: Failed password for mysql from 106.225.129.108 port 56023 ssh2 Nov 15 15:45:24 sso sshd[16730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.225.129.108 ... | 2019-11-15 23:26:06 | 
| 91.121.211.34 | attackspambots | Nov 15 11:44:52 ws22vmsma01 sshd[133939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.34 Nov 15 11:44:54 ws22vmsma01 sshd[133939]: Failed password for invalid user webmaster from 91.121.211.34 port 51890 ssh2 ... | 2019-11-16 00:02:51 | 
| 109.123.117.246 | attack | MultiHost/MultiPort Probe, Scan, Hack - | 2019-11-15 23:54:47 | 
| 222.186.175.167 | attack | Nov 15 16:35:13 nextcloud sshd\[15467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root Nov 15 16:35:15 nextcloud sshd\[15467\]: Failed password for root from 222.186.175.167 port 19698 ssh2 Nov 15 16:35:33 nextcloud sshd\[15959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root ... | 2019-11-15 23:43:30 |