City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.9.77.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;46.9.77.113. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 13:33:28 CST 2025
;; MSG SIZE rcvd: 104
113.77.9.46.in-addr.arpa domain name pointer ti0130q161-1630.bb.online.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
113.77.9.46.in-addr.arpa name = ti0130q161-1630.bb.online.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 220.124.240.66 | attackspam | (imapd) Failed IMAP login from 220.124.240.66 (KR/South Korea/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 11 01:00:03 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user= |
2020-08-11 06:24:01 |
| 74.84.150.75 | attackbots | Auto Detect Rule! proto TCP (SYN), 74.84.150.75:63153->gjan.info:20, len 52 |
2020-08-11 06:21:04 |
| 186.93.142.191 | attack | Unauthorized connection attempt from IP address 186.93.142.191 on Port 445(SMB) |
2020-08-11 06:08:25 |
| 203.107.32.162 | attack | SmallBizIT.US 12 packets to tcp(23,7110,13330,13679,17338,32451,38568,57761,62582,65363) |
2020-08-11 06:34:49 |
| 47.91.44.93 | attack | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-11 06:20:18 |
| 159.65.154.48 | attackbots | Aug 10 23:57:33 piServer sshd[27607]: Failed password for root from 159.65.154.48 port 42950 ssh2 Aug 11 00:00:48 piServer sshd[27981]: Failed password for root from 159.65.154.48 port 34128 ssh2 ... |
2020-08-11 06:08:43 |
| 129.226.67.92 | attack | Aug 10 23:31:35 santamaria sshd\[17224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.67.92 user=root Aug 10 23:31:37 santamaria sshd\[17224\]: Failed password for root from 129.226.67.92 port 48854 ssh2 Aug 10 23:37:42 santamaria sshd\[17342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.67.92 user=root ... |
2020-08-11 06:38:40 |
| 158.69.251.161 | attackbotsspam | [MK-VM5] Blocked by UFW |
2020-08-11 06:17:05 |
| 81.16.240.38 | attack | Unauthorized connection attempt from IP address 81.16.240.38 on Port 445(SMB) |
2020-08-11 06:24:28 |
| 220.178.71.156 | attackspambots | Auto Detect Rule! proto TCP (SYN), 220.178.71.156:55016->gjan.info:1433, len 40 |
2020-08-11 06:12:59 |
| 36.80.189.115 | attackbotsspam | Unauthorized connection attempt from IP address 36.80.189.115 on Port 445(SMB) |
2020-08-11 06:14:12 |
| 189.211.182.93 | attackbotsspam | Unauthorized connection attempt from IP address 189.211.182.93 on Port 445(SMB) |
2020-08-11 06:09:51 |
| 163.172.161.31 | attackbotsspam | Aug 10 06:01:36 finn sshd[6561]: Did not receive identification string from 163.172.161.31 port 43132 Aug 10 06:01:53 finn sshd[6575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.161.31 user=r.r Aug 10 06:01:55 finn sshd[6575]: Failed password for r.r from 163.172.161.31 port 56586 ssh2 Aug 10 06:01:55 finn sshd[6575]: Received disconnect from 163.172.161.31 port 56586:11: Normal Shutdown, Thank you for playing [preauth] Aug 10 06:01:55 finn sshd[6575]: Disconnected from 163.172.161.31 port 56586 [preauth] Aug 10 06:02:10 finn sshd[6579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.161.31 user=r.r Aug 10 06:02:12 finn sshd[6579]: Failed password for r.r from 163.172.161.31 port 33826 ssh2 Aug 10 06:02:12 finn sshd[6579]: Received disconnect from 163.172.161.31 port 33826:11: Normal Shutdown, Thank you for playing [preauth] Aug 10 06:02:12 finn sshd[6579]: Disconnect........ ------------------------------- |
2020-08-11 06:43:38 |
| 122.96.140.226 | attackspam | aaaa |
2020-08-11 06:18:26 |
| 14.177.232.31 | attackbotsspam | Aug 10 23:45:54 pl3server sshd[3478]: Bad protocol version identification '' from 14.177.232.31 port 54174 Aug 10 23:45:56 pl3server sshd[3479]: Invalid user pi from 14.177.232.31 port 54248 Aug 10 23:45:56 pl3server sshd[3479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.177.232.31 Aug 10 23:45:58 pl3server sshd[3479]: Failed password for invalid user pi from 14.177.232.31 port 54248 ssh2 Aug 10 23:45:58 pl3server sshd[3479]: Connection closed by 14.177.232.31 port 54248 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.177.232.31 |
2020-08-11 06:44:07 |