City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.9.37.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.9.37.49. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 01:33:29 CST 2025
;; MSG SIZE rcvd: 103
49.37.9.46.in-addr.arpa domain name pointer 49.37.9.46.customer.cdi.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
49.37.9.46.in-addr.arpa name = 49.37.9.46.customer.cdi.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.97.128.130 | attack | Unauthorized connection attempt detected from IP address 122.97.128.130 to port 23 [J] |
2020-01-14 07:21:37 |
| 222.186.15.10 | attackspambots | Brute-force attempt banned |
2020-01-14 07:41:17 |
| 77.148.22.194 | attack | Jan 13 13:23:29 eddieflores sshd\[16216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.22.148.77.rev.sfr.net user=root Jan 13 13:23:31 eddieflores sshd\[16216\]: Failed password for root from 77.148.22.194 port 37220 ssh2 Jan 13 13:29:49 eddieflores sshd\[16690\]: Invalid user nathalie from 77.148.22.194 Jan 13 13:29:49 eddieflores sshd\[16690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.22.148.77.rev.sfr.net Jan 13 13:29:51 eddieflores sshd\[16690\]: Failed password for invalid user nathalie from 77.148.22.194 port 49424 ssh2 |
2020-01-14 07:46:19 |
| 223.220.159.78 | attackspam | Invalid user xavier from 223.220.159.78 port 19537 |
2020-01-14 07:35:22 |
| 178.62.107.141 | attackbotsspam | 2020-01-13 22:19:58,718 fail2ban.actions [2870]: NOTICE [sshd] Ban 178.62.107.141 2020-01-13 22:53:56,541 fail2ban.actions [2870]: NOTICE [sshd] Ban 178.62.107.141 2020-01-13 23:26:59,976 fail2ban.actions [2870]: NOTICE [sshd] Ban 178.62.107.141 2020-01-14 00:00:52,897 fail2ban.actions [2870]: NOTICE [sshd] Ban 178.62.107.141 2020-01-14 00:34:56,967 fail2ban.actions [2870]: NOTICE [sshd] Ban 178.62.107.141 ... |
2020-01-14 07:37:30 |
| 122.54.247.83 | attack | Invalid user tiago from 122.54.247.83 port 51606 |
2020-01-14 07:21:58 |
| 121.127.15.91 | attack | 2020-01-13T21:21:34.179635abusebot.cloudsearch.cf sshd[20451]: Invalid user support from 121.127.15.91 port 55855 2020-01-13T21:21:34.185295abusebot.cloudsearch.cf sshd[20451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.127.15.91 2020-01-13T21:21:34.179635abusebot.cloudsearch.cf sshd[20451]: Invalid user support from 121.127.15.91 port 55855 2020-01-13T21:21:36.618778abusebot.cloudsearch.cf sshd[20451]: Failed password for invalid user support from 121.127.15.91 port 55855 ssh2 2020-01-13T21:22:36.697404abusebot.cloudsearch.cf sshd[20505]: Invalid user butter from 121.127.15.91 port 60856 2020-01-13T21:22:36.704287abusebot.cloudsearch.cf sshd[20505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.127.15.91 2020-01-13T21:22:36.697404abusebot.cloudsearch.cf sshd[20505]: Invalid user butter from 121.127.15.91 port 60856 2020-01-13T21:22:38.314942abusebot.cloudsearch.cf sshd[20505]: Failed passwor ... |
2020-01-14 07:25:40 |
| 106.8.86.51 | attackbots | Unauthorized connection attempt detected from IP address 106.8.86.51 to port 23 [J] |
2020-01-14 07:54:06 |
| 147.172.96.71 | attackbots | Jan 13 22:06:18 pl3server sshd[20986]: Invalid user elisa from 147.172.96.71 Jan 13 22:06:18 pl3server sshd[20986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.172.96.71 Jan 13 22:06:20 pl3server sshd[20986]: Failed password for invalid user elisa from 147.172.96.71 port 59256 ssh2 Jan 13 22:06:21 pl3server sshd[20986]: Received disconnect from 147.172.96.71: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=147.172.96.71 |
2020-01-14 07:27:01 |
| 132.232.74.106 | attackbotsspam | Unauthorized connection attempt detected from IP address 132.232.74.106 to port 2220 [J] |
2020-01-14 07:48:17 |
| 49.88.112.116 | attackbotsspam | Jan 14 00:11:53 localhost sshd\[11716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116 user=root Jan 14 00:11:55 localhost sshd\[11716\]: Failed password for root from 49.88.112.116 port 38226 ssh2 Jan 14 00:11:57 localhost sshd\[11716\]: Failed password for root from 49.88.112.116 port 38226 ssh2 |
2020-01-14 07:16:32 |
| 118.25.101.161 | attack | 2020-01-13T23:42:07.556643shield sshd\[16587\]: Invalid user li from 118.25.101.161 port 54546 2020-01-13T23:42:07.564681shield sshd\[16587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.101.161 2020-01-13T23:42:10.032664shield sshd\[16587\]: Failed password for invalid user li from 118.25.101.161 port 54546 ssh2 2020-01-13T23:45:34.148326shield sshd\[17646\]: Invalid user ftptest from 118.25.101.161 port 54842 2020-01-13T23:45:34.155125shield sshd\[17646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.101.161 |
2020-01-14 07:51:57 |
| 2.139.209.78 | attack | Unauthorized connection attempt detected from IP address 2.139.209.78 to port 2220 [J] |
2020-01-14 07:17:28 |
| 205.209.158.69 | attack | 20/1/13@16:21:54: FAIL: Alarm-Network address from=205.209.158.69 20/1/13@16:21:54: FAIL: Alarm-Network address from=205.209.158.69 ... |
2020-01-14 07:51:33 |
| 185.39.10.14 | attackspambots | Multiport scan : 83 ports scanned 4344 4354 4376 4413 4425 4429 4465 4472 4497 4503 4562 4564 4577 4596 4609 4610 4631 4640 4644 4645 4674 4688 4690 4692 4704 4720 4729 4745 4746 4777 4812 4828 4848 4851 4903 4951 4967 5044 5077 5079 5091 5125 5165 5168 5214 5230 5269 5273 5285 5287 5289 5301 5310 5322 5326 5330 5343 5359 5362 5375 5378 5394 5407 5408 5410 5431 5449 5463 5488 5489 5495 5504 5553 5586 5594 5601 5617 5633 5649 5660 ..... |
2020-01-14 07:42:52 |