City: Molde
Region: More og Romdal
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.166.9.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.166.9.99.			IN	A
;; AUTHORITY SECTION:
.			28	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121501 1800 900 604800 86400
;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 16 11:56:26 CST 2024
;; MSG SIZE  rcvd: 104
        99.9.166.81.in-addr.arpa domain name pointer 99.81-166-9.customer.lyse.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
99.9.166.81.in-addr.arpa	name = 99.81-166-9.customer.lyse.net.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 165.22.186.178 | attackbots | Jul 18 13:11:52 localhost sshd\[17207\]: Invalid user ftpadm from 165.22.186.178 port 48214 Jul 18 13:11:52 localhost sshd\[17207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.186.178 Jul 18 13:11:54 localhost sshd\[17207\]: Failed password for invalid user ftpadm from 165.22.186.178 port 48214 ssh2 ...  | 
                    2020-07-18 23:48:50 | 
| 23.129.64.207 | attackbotsspam | SSH Brute-Force attacks  | 
                    2020-07-18 23:36:13 | 
| 124.156.102.254 | attackspam | Invalid user school from 124.156.102.254 port 57998  | 
                    2020-07-18 23:53:47 | 
| 122.51.27.69 | attackspambots | Invalid user darren from 122.51.27.69 port 57134  | 
                    2020-07-18 23:54:43 | 
| 35.245.33.180 | attackbotsspam | prod6 ...  | 
                    2020-07-19 00:12:45 | 
| 106.38.33.70 | attackbots | Invalid user pilot from 106.38.33.70 port 54118  | 
                    2020-07-18 23:57:45 | 
| 78.195.178.119 | attackspam | Invalid user pi from 78.195.178.119 port 46915  | 
                    2020-07-19 00:03:30 | 
| 46.101.40.21 | attack | 
  | 
                    2020-07-19 00:09:44 | 
| 27.102.134.201 | attack | Jul 18 17:07:17 melroy-server sshd[510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.102.134.201 Jul 18 17:07:19 melroy-server sshd[510]: Failed password for invalid user katy from 27.102.134.201 port 34802 ssh2 ...  | 
                    2020-07-18 23:35:49 | 
| 109.194.174.78 | attackspam | 2020-07-18T14:52:12.021815mail.csmailer.org sshd[8924]: Invalid user centos from 109.194.174.78 port 54746 2020-07-18T14:52:12.025304mail.csmailer.org sshd[8924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.174.78 2020-07-18T14:52:12.021815mail.csmailer.org sshd[8924]: Invalid user centos from 109.194.174.78 port 54746 2020-07-18T14:52:13.836834mail.csmailer.org sshd[8924]: Failed password for invalid user centos from 109.194.174.78 port 54746 ssh2 2020-07-18T14:56:32.560893mail.csmailer.org sshd[9260]: Invalid user mironov from 109.194.174.78 port 33900 ...  | 
                    2020-07-18 23:56:38 | 
| 72.131.123.136 | attackspambots | Port 22 Scan, PTR: None  | 
                    2020-07-19 00:04:21 | 
| 97.84.225.94 | attackbots | Jul 18 16:42:04 ajax sshd[29080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.84.225.94 Jul 18 16:42:06 ajax sshd[29080]: Failed password for invalid user minecraft from 97.84.225.94 port 44976 ssh2  | 
                    2020-07-19 00:00:10 | 
| 177.74.135.57 | attackspambots | Invalid user berta from 177.74.135.57 port 59452  | 
                    2020-07-18 23:47:44 | 
| 140.206.242.83 | attackbots | Invalid user yama from 140.206.242.83 port 52848  | 
                    2020-07-18 23:52:21 | 
| 65.99.67.100 | attackspam | Invalid user admin from 65.99.67.100 port 46639  | 
                    2020-07-19 00:05:31 |