City: unknown
Region: Oslo
Country: Norway
Internet Service Provider: Telenor
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.16.124.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;77.16.124.44. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:25:39 CST 2025
;; MSG SIZE rcvd: 105
44.124.16.77.in-addr.arpa domain name pointer 77.16.124.44.tmi.telenormobil.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
44.124.16.77.in-addr.arpa name = 77.16.124.44.tmi.telenormobil.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 142.93.248.5 | attackspam | 2019-08-11T02:13:50.076954abusebot-7.cloudsearch.cf sshd\[21703\]: Invalid user david from 142.93.248.5 port 36964 |
2019-08-11 13:28:42 |
| 77.47.193.35 | attackbotsspam | Automatic report - Banned IP Access |
2019-08-11 13:40:35 |
| 220.135.36.195 | attack | Aug 10 19:22:56 askasleikir sshd[22045]: Failed password for root from 220.135.36.195 port 37073 ssh2 |
2019-08-11 14:22:55 |
| 220.120.109.166 | attackspambots | Jan 18 07:27:46 motanud sshd\[10711\]: Invalid user olivia from 220.120.109.166 port 58736 Jan 18 07:27:46 motanud sshd\[10711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.109.166 Jan 18 07:27:49 motanud sshd\[10711\]: Failed password for invalid user olivia from 220.120.109.166 port 58736 ssh2 |
2019-08-11 13:24:08 |
| 141.98.81.38 | attackspambots | 08/10/2019-20:44:38.430536 141.98.81.38 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 5 |
2019-08-11 13:28:08 |
| 94.176.77.55 | attack | Unauthorised access (Aug 11) SRC=94.176.77.55 LEN=40 TTL=244 ID=38129 DF TCP DPT=23 WINDOW=14600 SYN Unauthorised access (Aug 11) SRC=94.176.77.55 LEN=40 TTL=244 ID=9941 DF TCP DPT=23 WINDOW=14600 SYN Unauthorised access (Aug 11) SRC=94.176.77.55 LEN=40 TTL=244 ID=46456 DF TCP DPT=23 WINDOW=14600 SYN |
2019-08-11 14:20:38 |
| 51.75.146.122 | attackspambots | Aug 11 07:19:56 SilenceServices sshd[5256]: Failed password for root from 51.75.146.122 port 52086 ssh2 Aug 11 07:24:49 SilenceServices sshd[8702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.146.122 Aug 11 07:24:51 SilenceServices sshd[8702]: Failed password for invalid user teamspeak from 51.75.146.122 port 47436 ssh2 |
2019-08-11 13:36:35 |
| 94.179.59.229 | attackspam | Unauthorised access (Aug 11) SRC=94.179.59.229 LEN=52 TTL=122 ID=748 DF TCP DPT=445 WINDOW=8192 SYN |
2019-08-11 13:37:12 |
| 113.14.133.102 | attackspambots | 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x 2019-08-11 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=113.14.133.102 |
2019-08-11 14:00:53 |
| 54.158.19.140 | attackbots | Aug 11 01:41:44 debian sshd\[10744\]: Invalid user gdesigns from 54.158.19.140 port 56574 Aug 11 01:41:44 debian sshd\[10744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.158.19.140 Aug 11 01:41:46 debian sshd\[10744\]: Failed password for invalid user gdesigns from 54.158.19.140 port 56574 ssh2 ... |
2019-08-11 14:06:01 |
| 104.197.122.218 | attackspambots | 2019-08-11T00:11:03.146484hz01.yumiweb.com sshd\[11418\]: Invalid user warehouse from 104.197.122.218 port 50368 2019-08-11T00:16:26.731638hz01.yumiweb.com sshd\[11429\]: Invalid user warehouse from 104.197.122.218 port 54016 2019-08-11T00:21:47.372170hz01.yumiweb.com sshd\[11443\]: Invalid user web from 104.197.122.218 port 57664 ... |
2019-08-11 13:49:38 |
| 122.195.200.148 | attackbots | 2019-08-11T00:45:37.720960Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 122.195.200.148:15347 \(107.175.91.48:22\) \[session: d64ac62ba8fd\] 2019-08-11T06:17:51.192826Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 122.195.200.148:34021 \(107.175.91.48:22\) \[session: 7d6bbaff97ff\] ... |
2019-08-11 14:27:07 |
| 185.176.27.114 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-08-11 14:00:13 |
| 119.75.44.106 | attackbotsspam | brute force RDP attempt on non standard port |
2019-08-11 13:26:01 |
| 219.92.121.92 | attackspam | Jan 7 10:03:03 motanud sshd\[15324\]: Invalid user jira from 219.92.121.92 port 36166 Jan 7 10:03:03 motanud sshd\[15324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.92.121.92 Jan 7 10:03:04 motanud sshd\[15324\]: Failed password for invalid user jira from 219.92.121.92 port 36166 ssh2 |
2019-08-11 14:23:17 |