City: Saxtorp
Region: Skåne County
Country: Sweden
Internet Service Provider: Telenor
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.195.11.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.195.11.194. IN A
;; AUTHORITY SECTION:
. 111 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022032502 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 26 10:24:01 CST 2022
;; MSG SIZE rcvd: 106
194.11.195.46.in-addr.arpa domain name pointer c-2ec30bc2-74736162.cust.telenor.se.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
194.11.195.46.in-addr.arpa name = c-2ec30bc2-74736162.cust.telenor.se.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 83.97.20.19 | attack | port 80 blocked by firewall |
2019-11-06 13:58:31 |
| 222.65.104.23 | attackbotsspam | 445/tcp [2019-11-06]1pkt |
2019-11-06 14:20:21 |
| 36.236.91.214 | attackbotsspam | 23/tcp [2019-11-06]1pkt |
2019-11-06 14:10:45 |
| 175.207.13.200 | attack | Nov 5 19:53:49 web9 sshd\[25315\]: Invalid user P4sswort@2017 from 175.207.13.200 Nov 5 19:53:49 web9 sshd\[25315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 Nov 5 19:53:51 web9 sshd\[25315\]: Failed password for invalid user P4sswort@2017 from 175.207.13.200 port 42752 ssh2 Nov 5 19:58:54 web9 sshd\[26115\]: Invalid user q2w3e4R from 175.207.13.200 Nov 5 19:58:54 web9 sshd\[26115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 |
2019-11-06 13:59:05 |
| 124.248.166.216 | attack | 81/tcp [2019-11-06]1pkt |
2019-11-06 14:20:04 |
| 165.22.160.32 | attackspam | Nov 6 06:58:33 ns41 sshd[19361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.160.32 |
2019-11-06 14:11:00 |
| 182.53.70.149 | attack | 445/tcp [2019-11-06]1pkt |
2019-11-06 13:55:22 |
| 116.36.168.80 | attack | Nov 6 07:11:19 vtv3 sshd\[3461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.36.168.80 user=root Nov 6 07:11:21 vtv3 sshd\[3461\]: Failed password for root from 116.36.168.80 port 53438 ssh2 Nov 6 07:15:43 vtv3 sshd\[6341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.36.168.80 user=root Nov 6 07:15:45 vtv3 sshd\[6341\]: Failed password for root from 116.36.168.80 port 36506 ssh2 Nov 6 07:20:19 vtv3 sshd\[9379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.36.168.80 user=root Nov 6 07:33:45 vtv3 sshd\[17443\]: Invalid user student from 116.36.168.80 port 53676 Nov 6 07:33:45 vtv3 sshd\[17443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.36.168.80 Nov 6 07:33:47 vtv3 sshd\[17443\]: Failed password for invalid user student from 116.36.168.80 port 53676 ssh2 Nov 6 07:38:30 vtv3 sshd\[20495\]: pam_u |
2019-11-06 14:09:57 |
| 27.193.122.23 | attack | 60001/tcp 60001/tcp [2019-11-06]2pkt |
2019-11-06 14:11:40 |
| 41.78.201.48 | attackspam | Nov 6 06:57:50 MK-Soft-VM4 sshd[1614]: Failed password for root from 41.78.201.48 port 42145 ssh2 ... |
2019-11-06 14:11:26 |
| 104.227.190.218 | attackbots | (From clarkrose375@gmail.com) Hi there! I'm a digital marketing specialist, and I ran some SEO reporting tools on your website. The results showed that there's a lot of additional web traffic we can get you by making sure that you're ranking higher in search engines like Google. You're not ranking very well at the moment, but you could be. I can help you increase your website ranking by fixing a few issues found on the back-end of your website and optimizing it for search engine algorithms. This leads to increased rankings, which then leads to getting additional traffic/sales. If you're interested, kindly write back because I'd really like to speak with you. If you want to know more about what I can accomplish for your site, we can set up a time for a free consultation. I'd like to share some insights and suggestions, and if all goes well then hopefully we can work together. I hope to speak with you soon! Thanks! Rose Clark |
2019-11-06 14:00:52 |
| 222.186.173.154 | attackspam | Nov 4 08:51:23 microserver sshd[11901]: Failed none for root from 222.186.173.154 port 38228 ssh2 Nov 4 08:51:26 microserver sshd[11901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154 user=root Nov 4 08:51:28 microserver sshd[11901]: Failed password for root from 222.186.173.154 port 38228 ssh2 Nov 4 08:51:33 microserver sshd[11901]: Failed password for root from 222.186.173.154 port 38228 ssh2 Nov 4 08:51:37 microserver sshd[11901]: Failed password for root from 222.186.173.154 port 38228 ssh2 Nov 4 20:40:57 microserver sshd[41869]: Failed none for root from 222.186.173.154 port 11386 ssh2 Nov 4 20:40:59 microserver sshd[41869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154 user=root Nov 4 20:41:01 microserver sshd[41869]: Failed password for root from 222.186.173.154 port 11386 ssh2 Nov 4 20:41:04 microserver sshd[41869]: Failed password for root from 222.186.173.154 port 11386 ssh2 |
2019-11-06 13:50:25 |
| 222.186.180.6 | attackspambots | Nov 6 07:05:05 amit sshd\[28473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root Nov 6 07:05:07 amit sshd\[28473\]: Failed password for root from 222.186.180.6 port 45122 ssh2 Nov 6 07:05:32 amit sshd\[28475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root ... |
2019-11-06 14:07:48 |
| 94.191.102.171 | attack | Nov 5 19:59:02 auw2 sshd\[17076\]: Invalid user huso from 94.191.102.171 Nov 5 19:59:02 auw2 sshd\[17076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.102.171 Nov 5 19:59:04 auw2 sshd\[17076\]: Failed password for invalid user huso from 94.191.102.171 port 48802 ssh2 Nov 5 20:04:28 auw2 sshd\[17479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.102.171 user=root Nov 5 20:04:30 auw2 sshd\[17479\]: Failed password for root from 94.191.102.171 port 59808 ssh2 |
2019-11-06 14:18:21 |
| 58.56.66.199 | attackbotsspam | 1433/tcp [2019-11-06]1pkt |
2019-11-06 13:58:01 |