City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.239.85.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.239.85.157. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 05:55:43 CST 2025
;; MSG SIZE rcvd: 106
157.85.239.80.in-addr.arpa domain name pointer 80-239-85-157.telia-isp.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
157.85.239.80.in-addr.arpa name = 80-239-85-157.telia-isp.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 116.55.243.113 | attackbots | Port Scan ... |
2020-07-20 05:11:12 |
| 106.38.158.131 | attack | Jul 19 13:55:54 lanister sshd[1693]: Invalid user tanghao from 106.38.158.131 Jul 19 13:55:54 lanister sshd[1693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.38.158.131 Jul 19 13:55:54 lanister sshd[1693]: Invalid user tanghao from 106.38.158.131 Jul 19 13:55:56 lanister sshd[1693]: Failed password for invalid user tanghao from 106.38.158.131 port 2051 ssh2 |
2020-07-20 05:22:22 |
| 106.53.2.215 | attack | Jul 19 22:09:07 piServer sshd[12171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.2.215 Jul 19 22:09:09 piServer sshd[12171]: Failed password for invalid user laureen from 106.53.2.215 port 47252 ssh2 Jul 19 22:11:26 piServer sshd[12589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.2.215 ... |
2020-07-20 05:43:07 |
| 181.63.248.149 | attackbotsspam | Jul 19 19:26:03 web-main sshd[656111]: Invalid user git from 181.63.248.149 port 40849 Jul 19 19:26:06 web-main sshd[656111]: Failed password for invalid user git from 181.63.248.149 port 40849 ssh2 Jul 19 19:34:01 web-main sshd[656379]: Invalid user geng from 181.63.248.149 port 35538 |
2020-07-20 05:42:51 |
| 3.128.234.21 | attackspambots | Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-07-20 05:22:58 |
| 144.34.180.16 | attackbots | Jul 19 16:41:28 ws19vmsma01 sshd[136189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.180.16 Jul 19 16:41:30 ws19vmsma01 sshd[136189]: Failed password for invalid user rf from 144.34.180.16 port 45339 ssh2 ... |
2020-07-20 05:21:55 |
| 5.188.210.73 | attackspam | Automatic report - Banned IP Access |
2020-07-20 05:19:12 |
| 41.65.182.130 | attackbots | 1433/tcp 445/tcp... [2020-06-22/07-18]6pkt,2pt.(tcp) |
2020-07-20 05:42:11 |
| 80.82.65.74 | attack | Jul 19 21:08:11 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=80.82.65.74 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=4618 PROTO=TCP SPT=54486 DPT=9040 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 19 21:40:39 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=80.82.65.74 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=21135 PROTO=TCP SPT=54486 DPT=8302 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 19 22:02:23 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=80.82.65.74 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=5904 PROTO=TCP SPT=54486 DPT=1080 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-20 05:11:59 |
| 222.186.15.115 | attack | 2020-07-20T00:27:27.830655lavrinenko.info sshd[785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root 2020-07-20T00:27:30.180589lavrinenko.info sshd[785]: Failed password for root from 222.186.15.115 port 11941 ssh2 2020-07-20T00:27:27.830655lavrinenko.info sshd[785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root 2020-07-20T00:27:30.180589lavrinenko.info sshd[785]: Failed password for root from 222.186.15.115 port 11941 ssh2 2020-07-20T00:27:34.452626lavrinenko.info sshd[785]: Failed password for root from 222.186.15.115 port 11941 ssh2 ... |
2020-07-20 05:33:07 |
| 126.125.63.109 | attackspambots | 26/tcp 23/tcp [2020-06-06/07-19]2pkt |
2020-07-20 05:08:55 |
| 188.170.177.98 | attackspam | Port probing on unauthorized port 8080 |
2020-07-20 05:24:23 |
| 144.217.95.97 | attack | Jul 19 17:18:25 ny01 sshd[5606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.95.97 Jul 19 17:18:27 ny01 sshd[5606]: Failed password for invalid user rudy from 144.217.95.97 port 42940 ssh2 Jul 19 17:22:53 ny01 sshd[6152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.95.97 |
2020-07-20 05:31:29 |
| 42.159.121.246 | attackspam | Jul 19 21:30:07 ns382633 sshd\[25140\]: Invalid user splunk from 42.159.121.246 port 40870 Jul 19 21:30:07 ns382633 sshd\[25140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.121.246 Jul 19 21:30:09 ns382633 sshd\[25140\]: Failed password for invalid user splunk from 42.159.121.246 port 40870 ssh2 Jul 19 21:38:45 ns382633 sshd\[26657\]: Invalid user qsc from 42.159.121.246 port 57186 Jul 19 21:38:45 ns382633 sshd\[26657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.121.246 |
2020-07-20 05:38:15 |
| 185.142.236.35 | attackbots |
|
2020-07-20 05:15:33 |