City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.157.8.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.157.8.154. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:13:46 CST 2025
;; MSG SIZE rcvd: 105
154.8.157.46.in-addr.arpa domain name pointer 46.157.8.154.tmi.telenormobil.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
154.8.157.46.in-addr.arpa name = 46.157.8.154.tmi.telenormobil.no.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
68.183.85.75 | attack | Invalid user deda from 68.183.85.75 port 48320 |
2019-08-11 11:20:53 |
195.8.208.168 | attack | MYH,DEF GET /wp-login.php GET /wp-login.php |
2019-08-11 11:37:16 |
208.67.222.222 | attackspambots | Aug 11 04:45:38 mail kernel: [239735.427923] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=208.67.222.222 DST=77.73.69.240 LEN=131 TOS=0x00 PREC=0x00 TTL=57 ID=58825 DF PROTO=UDP SPT=53 DPT=42614 LEN=111 Aug 11 04:45:38 mail kernel: [239735.431905] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=208.67.222.222 DST=77.73.69.240 LEN=122 TOS=0x00 PREC=0x00 TTL=57 ID=58826 DF PROTO=UDP SPT=53 DPT=42614 LEN=102 ... |
2019-08-11 11:08:46 |
134.0.9.81 | attackspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2019-08-11 11:09:42 |
216.167.162.37 | attack | 2019-08-10 17:26:58 H=(lolafitness.it) [216.167.162.37]:47762 I=[192.147.25.65]:25 F= |
2019-08-11 11:11:49 |
51.255.213.181 | attack | Aug 11 05:15:51 SilenceServices sshd[8254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.213.181 Aug 11 05:15:53 SilenceServices sshd[8254]: Failed password for invalid user testuser from 51.255.213.181 port 48856 ssh2 Aug 11 05:20:05 SilenceServices sshd[11490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.213.181 |
2019-08-11 11:40:54 |
37.29.22.46 | attackspam | [portscan] Port scan |
2019-08-11 11:49:23 |
31.204.181.238 | attackbots | 0,28-05/06 [bc01/m03] concatform PostRequest-Spammer scoring: Durban01 |
2019-08-11 11:20:18 |
221.193.177.14 | attackbots | Feb 25 05:02:30 motanud sshd\[31167\]: Invalid user admin1 from 221.193.177.14 port 37682 Feb 25 05:02:30 motanud sshd\[31167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.193.177.14 Feb 25 05:02:32 motanud sshd\[31167\]: Failed password for invalid user admin1 from 221.193.177.14 port 37682 ssh2 |
2019-08-11 11:34:44 |
221.226.9.90 | attackbotsspam | Feb 26 05:14:04 motanud sshd\[5986\]: Invalid user ky from 221.226.9.90 port 46514 Feb 26 05:14:04 motanud sshd\[5986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.9.90 Feb 26 05:14:05 motanud sshd\[5986\]: Failed password for invalid user ky from 221.226.9.90 port 46514 ssh2 |
2019-08-11 11:32:21 |
221.233.243.209 | attackbotsspam | Feb 25 14:57:09 motanud sshd\[27853\]: Invalid user guest3 from 221.233.243.209 port 1780 Feb 25 14:57:09 motanud sshd\[27853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.233.243.209 Feb 25 14:57:11 motanud sshd\[27853\]: Failed password for invalid user guest3 from 221.233.243.209 port 1780 ssh2 |
2019-08-11 11:29:46 |
157.230.230.181 | attack | Aug 11 03:56:26 areeb-Workstation sshd\[12055\]: Invalid user gary from 157.230.230.181 Aug 11 03:56:26 areeb-Workstation sshd\[12055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.230.181 Aug 11 03:56:28 areeb-Workstation sshd\[12055\]: Failed password for invalid user gary from 157.230.230.181 port 54486 ssh2 ... |
2019-08-11 11:31:54 |
221.160.100.14 | attack | Mar 5 04:17:41 motanud sshd\[6646\]: Invalid user postgres from 221.160.100.14 port 53510 Mar 5 04:17:41 motanud sshd\[6646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14 Mar 5 04:17:44 motanud sshd\[6646\]: Failed password for invalid user postgres from 221.160.100.14 port 53510 ssh2 |
2019-08-11 11:38:09 |
216.245.210.54 | attack | SIPVicious Scanner Detection, PTR: 54-210-245-216.static.reverse.lstn.net. |
2019-08-11 11:10:51 |
94.102.50.96 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-08-11 11:52:20 |