City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: Telia
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.238.44.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.238.44.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011201 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 11:02:27 CST 2025
;; MSG SIZE rcvd: 105
21.44.238.81.in-addr.arpa domain name pointer host-81-238-44-21.homerun.telia.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.44.238.81.in-addr.arpa name = host-81-238-44-21.homerun.telia.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 31.184.218.69 | attackspam | Port scan on 15 port(s): 2002 2003 2004 2005 2006 2008 2010 33389 33391 33392 33394 33395 33396 33397 33398 |
2019-10-08 13:40:17 |
| 222.186.175.167 | attack | Oct 8 07:06:43 dedicated sshd[12892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root Oct 8 07:06:45 dedicated sshd[12892]: Failed password for root from 222.186.175.167 port 55260 ssh2 |
2019-10-08 13:19:15 |
| 188.213.49.176 | attackbots | WordPress login Brute force / Web App Attack on client site. |
2019-10-08 13:09:27 |
| 119.28.29.169 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-08 13:27:30 |
| 152.169.172.48 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/152.169.172.48/ AR - 1H : (27) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : AR NAME ASN : ASN10318 IP : 152.169.172.48 CIDR : 152.169.160.0/19 PREFIX COUNT : 262 UNIQUE IP COUNT : 2114560 WYKRYTE ATAKI Z ASN10318 : 1H - 3 3H - 3 6H - 3 12H - 3 24H - 6 DateTime : 2019-10-08 05:57:32 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-08 13:45:11 |
| 51.38.93.209 | attackbotsspam | Oct 8 05:31:17 carla sshd[13979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.93.209 user=r.r Oct 8 05:31:18 carla sshd[13979]: Failed password for r.r from 51.38.93.209 port 49478 ssh2 Oct 8 05:31:18 carla sshd[13980]: Received disconnect from 51.38.93.209: 11: Bye Bye Oct 8 05:31:19 carla sshd[13981]: Invalid user admin from 51.38.93.209 Oct 8 05:31:19 carla sshd[13981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.93.209 Oct 8 05:31:21 carla sshd[13981]: Failed password for invalid user admin from 51.38.93.209 port 51876 ssh2 Oct 8 05:31:21 carla sshd[13982]: Received disconnect from 51.38.93.209: 11: Bye Bye Oct 8 05:31:21 carla sshd[13983]: Invalid user admin from 51.38.93.209 Oct 8 05:31:21 carla sshd[13983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.93.209 Oct 8 05:31:22 carla sshd[13983]: Failed passw........ ------------------------------- |
2019-10-08 13:23:47 |
| 46.251.239.31 | attackbots | 2019-10-08T05:30:38.161038abusebot-5.cloudsearch.cf sshd\[31454\]: Invalid user ripley from 46.251.239.31 port 57668 |
2019-10-08 13:57:40 |
| 164.132.53.185 | attack | Oct 7 19:08:29 hpm sshd\[1284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.scd.ovh user=root Oct 7 19:08:31 hpm sshd\[1284\]: Failed password for root from 164.132.53.185 port 44858 ssh2 Oct 7 19:12:36 hpm sshd\[1771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.scd.ovh user=root Oct 7 19:12:38 hpm sshd\[1771\]: Failed password for root from 164.132.53.185 port 56966 ssh2 Oct 7 19:16:34 hpm sshd\[2106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.scd.ovh user=root |
2019-10-08 13:53:03 |
| 165.22.144.206 | attackspam | 2019-10-08T01:13:25.1978991495-001 sshd\[41601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.206 user=root 2019-10-08T01:13:26.8144541495-001 sshd\[41601\]: Failed password for root from 165.22.144.206 port 49116 ssh2 2019-10-08T01:17:10.9105571495-001 sshd\[41909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.206 user=root 2019-10-08T01:17:13.4152991495-001 sshd\[41909\]: Failed password for root from 165.22.144.206 port 59696 ssh2 2019-10-08T01:20:49.0391291495-001 sshd\[42229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.206 user=root 2019-10-08T01:20:50.4704011495-001 sshd\[42229\]: Failed password for root from 165.22.144.206 port 42022 ssh2 ... |
2019-10-08 13:49:24 |
| 119.179.201.103 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/119.179.201.103/ CN - 1H : (526) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4837 IP : 119.179.201.103 CIDR : 119.176.0.0/12 PREFIX COUNT : 1262 UNIQUE IP COUNT : 56665856 WYKRYTE ATAKI Z ASN4837 : 1H - 15 3H - 36 6H - 61 12H - 114 24H - 219 DateTime : 2019-10-08 05:57:33 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-08 13:46:59 |
| 112.214.189.211 | attack | Apr 22 10:11:05 ubuntu sshd[25571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.214.189.211 Apr 22 10:11:07 ubuntu sshd[25571]: Failed password for invalid user aasmundsen from 112.214.189.211 port 42216 ssh2 Apr 22 10:13:50 ubuntu sshd[25665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.214.189.211 Apr 22 10:13:52 ubuntu sshd[25665]: Failed password for invalid user dan from 112.214.189.211 port 39372 ssh2 |
2019-10-08 13:05:59 |
| 173.82.154.74 | attackbotsspam | Oct 8 03:54:05 www_kotimaassa_fi sshd[834]: Failed password for root from 173.82.154.74 port 51334 ssh2 ... |
2019-10-08 13:29:57 |
| 112.21.188.183 | attackbots | Jul 3 10:03:36 dallas01 sshd[507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.188.183 Jul 3 10:03:38 dallas01 sshd[507]: Failed password for invalid user backupuser from 112.21.188.183 port 26707 ssh2 Jul 3 10:07:05 dallas01 sshd[967]: Failed password for news from 112.21.188.183 port 7452 ssh2 |
2019-10-08 13:10:44 |
| 159.203.193.51 | attackspam | Automatic report - Port Scan Attack |
2019-10-08 13:17:46 |
| 92.118.161.45 | attackspam | Automatic report - Port Scan Attack |
2019-10-08 13:03:06 |