City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.19.93.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;77.19.93.43. IN A
;; AUTHORITY SECTION:
. 267 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 09:37:04 CST 2022
;; MSG SIZE rcvd: 104
43.93.19.77.in-addr.arpa domain name pointer 77.19.93.43.tmi.telenormobil.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
43.93.19.77.in-addr.arpa name = 77.19.93.43.tmi.telenormobil.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 36.48.145.118 | attack | Lines containing failures of 36.48.145.118 Jun 1 13:37:33 neon sshd[8477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.48.145.118 user=r.r Jun 1 13:37:35 neon sshd[8477]: Failed password for r.r from 36.48.145.118 port 5503 ssh2 Jun 1 13:37:38 neon sshd[8477]: Received disconnect from 36.48.145.118 port 5503:11: Bye Bye [preauth] Jun 1 13:37:38 neon sshd[8477]: Disconnected from authenticating user r.r 36.48.145.118 port 5503 [preauth] Jun 1 13:54:01 neon sshd[13709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.48.145.118 user=r.r Jun 1 13:54:03 neon sshd[13709]: Failed password for r.r from 36.48.145.118 port 6059 ssh2 Jun 1 13:54:03 neon sshd[13709]: Received disconnect from 36.48.145.118 port 6059:11: Bye Bye [preauth] Jun 1 13:54:03 neon sshd[13709]: Disconnected from authenticating user r.r 36.48.145.118 port 6059 [preauth] Jun 1 13:58:30 neon sshd[15246]: pam_un........ ------------------------------ |
2020-06-02 00:09:42 |
| 175.24.28.164 | attackspambots | 2020-06-01T14:15:56.457266shield sshd\[22131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.28.164 user=root 2020-06-01T14:15:58.761498shield sshd\[22131\]: Failed password for root from 175.24.28.164 port 46886 ssh2 2020-06-01T14:18:14.416407shield sshd\[22654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.28.164 user=root 2020-06-01T14:18:16.665374shield sshd\[22654\]: Failed password for root from 175.24.28.164 port 43600 ssh2 2020-06-01T14:20:30.199926shield sshd\[23268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.28.164 user=root |
2020-06-01 23:53:15 |
| 103.129.223.101 | attackspam | Jun 1 09:22:42 serwer sshd\[17136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.101 user=root Jun 1 09:22:44 serwer sshd\[17136\]: Failed password for root from 103.129.223.101 port 47652 ssh2 Jun 1 09:26:43 serwer sshd\[17527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.101 user=root Jun 1 09:26:45 serwer sshd\[17527\]: Failed password for root from 103.129.223.101 port 53270 ssh2 Jun 1 09:30:52 serwer sshd\[18055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.101 user=root Jun 1 09:30:54 serwer sshd\[18055\]: Failed password for root from 103.129.223.101 port 58874 ssh2 Jun 1 09:34:58 serwer sshd\[18347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.101 user=root Jun 1 09:34:59 serwer sshd\[18347\]: Failed password for root from 103.129. ... |
2020-06-01 23:42:03 |
| 198.108.67.20 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-06-01 23:47:07 |
| 106.52.137.134 | attack | Jun 1 12:56:46 fwservlet sshd[14913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.137.134 user=r.r Jun 1 12:56:48 fwservlet sshd[14913]: Failed password for r.r from 106.52.137.134 port 39430 ssh2 Jun 1 12:56:49 fwservlet sshd[14913]: Received disconnect from 106.52.137.134 port 39430:11: Bye Bye [preauth] Jun 1 12:56:49 fwservlet sshd[14913]: Disconnected from 106.52.137.134 port 39430 [preauth] Jun 1 13:01:57 fwservlet sshd[15033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.137.134 user=r.r Jun 1 13:02:00 fwservlet sshd[15033]: Failed password for r.r from 106.52.137.134 port 36138 ssh2 Jun 1 13:02:00 fwservlet sshd[15033]: Received disconnect from 106.52.137.134 port 36138:11: Bye Bye [preauth] Jun 1 13:02:00 fwservlet sshd[15033]: Disconnected from 106.52.137.134 port 36138 [preauth] Jun 1 13:06:36 fwservlet sshd[15125]: pam_unix(sshd:auth): authenticati........ ------------------------------- |
2020-06-01 23:41:00 |
| 146.185.130.101 | attackspambots | (sshd) Failed SSH login from 146.185.130.101 (NL/Netherlands/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 1 14:21:59 amsweb01 sshd[3421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.130.101 user=root Jun 1 14:22:00 amsweb01 sshd[3421]: Failed password for root from 146.185.130.101 port 56494 ssh2 Jun 1 14:29:46 amsweb01 sshd[4755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.130.101 user=root Jun 1 14:29:48 amsweb01 sshd[4755]: Failed password for root from 146.185.130.101 port 38638 ssh2 Jun 1 14:37:00 amsweb01 sshd[6296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.130.101 user=root |
2020-06-01 23:37:59 |
| 106.13.94.193 | attackbotsspam | Jun 1 12:34:13 s30-ffm-r02 sshd[19090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.94.193 user=r.r Jun 1 12:34:15 s30-ffm-r02 sshd[19090]: Failed password for r.r from 106.13.94.193 port 43538 ssh2 Jun 1 12:43:40 s30-ffm-r02 sshd[19319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.94.193 user=r.r Jun 1 12:43:42 s30-ffm-r02 sshd[19319]: Failed password for r.r from 106.13.94.193 port 45914 ssh2 Jun 1 12:46:08 s30-ffm-r02 sshd[19374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.94.193 user=r.r Jun 1 12:46:10 s30-ffm-r02 sshd[19374]: Failed password for r.r from 106.13.94.193 port 43670 ssh2 Jun 1 12:48:00 s30-ffm-r02 sshd[19418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.94.193 user=r.r Jun 1 12:48:02 s30-ffm-r02 sshd[19418]: Failed password for r.r from 10........ ------------------------------- |
2020-06-01 23:52:43 |
| 178.128.122.126 | attackbotsspam | $f2bV_matches |
2020-06-02 00:08:48 |
| 157.55.39.43 | attack | Automatic report - Banned IP Access |
2020-06-01 23:47:33 |
| 34.80.56.210 | attack | Lines containing failures of 34.80.56.210 Jun 1 09:22:09 shared11 sshd[8156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.56.210 user=r.r Jun 1 09:22:10 shared11 sshd[8156]: Failed password for r.r from 34.80.56.210 port 41982 ssh2 Jun 1 09:22:11 shared11 sshd[8156]: Received disconnect from 34.80.56.210 port 41982:11: Bye Bye [preauth] Jun 1 09:22:11 shared11 sshd[8156]: Disconnected from authenticating user r.r 34.80.56.210 port 41982 [preauth] Jun 1 11:44:26 shared11 sshd[23460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.56.210 user=r.r Jun 1 11:44:28 shared11 sshd[23460]: Failed password for r.r from 34.80.56.210 port 51156 ssh2 Jun 1 11:44:29 shared11 sshd[23460]: Received disconnect from 34.80.56.210 port 51156:11: Bye Bye [preauth] Jun 1 11:44:29 shared11 sshd[23460]: Disconnected from authenticating user r.r 34.80.56.210 port 51156 [preauth] Jun 1 11:5........ ------------------------------ |
2020-06-02 00:13:42 |
| 222.186.175.212 | attackspam | Jun 1 17:53:43 server sshd[2393]: Failed none for root from 222.186.175.212 port 44936 ssh2 Jun 1 17:53:46 server sshd[2393]: Failed password for root from 222.186.175.212 port 44936 ssh2 Jun 1 17:53:49 server sshd[2393]: Failed password for root from 222.186.175.212 port 44936 ssh2 |
2020-06-02 00:04:54 |
| 106.12.149.253 | attackspam | Jun 1 07:15:51 server1 sshd\[28141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.149.253 user=root Jun 1 07:15:53 server1 sshd\[28141\]: Failed password for root from 106.12.149.253 port 51946 ssh2 Jun 1 07:16:41 server1 sshd\[28488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.149.253 user=root Jun 1 07:16:44 server1 sshd\[28488\]: Failed password for root from 106.12.149.253 port 60896 ssh2 Jun 1 07:17:33 server1 sshd\[28853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.149.253 user=root ... |
2020-06-01 23:41:21 |
| 49.233.145.188 | attackbotsspam | $f2bV_matches |
2020-06-01 23:36:15 |
| 110.8.67.146 | attack | Jun 1 13:58:36 PorscheCustomer sshd[10963]: Failed password for root from 110.8.67.146 port 38916 ssh2 Jun 1 14:02:44 PorscheCustomer sshd[11093]: Failed password for root from 110.8.67.146 port 43770 ssh2 ... |
2020-06-01 23:41:41 |
| 134.209.194.217 | attackspambots | Jun 1 13:59:52 abendstille sshd\[25744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.194.217 user=root Jun 1 13:59:55 abendstille sshd\[25744\]: Failed password for root from 134.209.194.217 port 60370 ssh2 Jun 1 14:03:18 abendstille sshd\[29068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.194.217 user=root Jun 1 14:03:20 abendstille sshd\[29068\]: Failed password for root from 134.209.194.217 port 37574 ssh2 Jun 1 14:06:53 abendstille sshd\[32482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.194.217 user=root ... |
2020-06-01 23:33:54 |