City: Hamar
Region: Innlandet
Country: Norway
Internet Service Provider: Telenor
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.9.139.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.9.139.221. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012001 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 10:27:17 CST 2025
;; MSG SIZE rcvd: 105
221.139.9.46.in-addr.arpa domain name pointer ti0010q160-3509.bb.online.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
221.139.9.46.in-addr.arpa name = ti0010q160-3509.bb.online.no.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
88.150.230.114 | attack | Port Scan ... |
2020-08-01 15:32:38 |
122.144.212.144 | attack | Aug 1 09:34:14 OPSO sshd\[18980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.212.144 user=root Aug 1 09:34:15 OPSO sshd\[18980\]: Failed password for root from 122.144.212.144 port 48956 ssh2 Aug 1 09:36:38 OPSO sshd\[19497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.212.144 user=root Aug 1 09:36:40 OPSO sshd\[19497\]: Failed password for root from 122.144.212.144 port 33126 ssh2 Aug 1 09:38:57 OPSO sshd\[19811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.212.144 user=root |
2020-08-01 15:50:11 |
37.59.125.163 | attackspambots | 2020-07-31T04:49:59.915016hostname sshd[26799]: Failed password for root from 37.59.125.163 port 57794 ssh2 ... |
2020-08-01 15:49:54 |
5.9.155.226 | attack | 20 attempts against mh-misbehave-ban on twig |
2020-08-01 15:22:57 |
219.149.108.195 | attackspam | 2020-08-01T07:25:19.178112shield sshd\[27807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.149.108.195 user=root 2020-08-01T07:25:20.378123shield sshd\[27807\]: Failed password for root from 219.149.108.195 port 52030 ssh2 2020-08-01T07:29:50.365780shield sshd\[29208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.149.108.195 user=root 2020-08-01T07:29:52.770052shield sshd\[29208\]: Failed password for root from 219.149.108.195 port 14221 ssh2 2020-08-01T07:34:19.890843shield sshd\[29869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.149.108.195 user=root |
2020-08-01 15:34:39 |
95.210.1.42 | attackbots | Automatic report - Port Scan Attack |
2020-08-01 15:20:01 |
37.49.224.156 | attackbotsspam | SSH Brute Force |
2020-08-01 15:15:08 |
123.206.38.253 | attackspambots | SSH Brute Force |
2020-08-01 15:31:52 |
189.39.112.219 | attackspambots | Aug 1 06:43:58 rocket sshd[10742]: Failed password for root from 189.39.112.219 port 60606 ssh2 Aug 1 06:48:55 rocket sshd[11516]: Failed password for root from 189.39.112.219 port 39107 ssh2 ... |
2020-08-01 15:37:08 |
51.75.30.199 | attack | SSH Brute Force |
2020-08-01 15:54:50 |
175.24.9.251 | attack | Invalid user qzb from 175.24.9.251 port 48270 |
2020-08-01 15:20:29 |
159.65.111.89 | attackspambots | Invalid user marcela from 159.65.111.89 port 39328 |
2020-08-01 15:56:10 |
222.209.146.187 | attackspam | $f2bV_matches |
2020-08-01 15:40:35 |
111.229.246.61 | attack | Aug 1 05:06:09 rocket sshd[28089]: Failed password for root from 111.229.246.61 port 57332 ssh2 Aug 1 05:12:05 rocket sshd[29411]: Failed password for root from 111.229.246.61 port 36364 ssh2 ... |
2020-08-01 15:16:26 |
93.125.121.170 | attack | Port Scan detected! ... |
2020-08-01 15:34:56 |