City: Stange
Region: Innlandet
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.49.133.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;84.49.133.152.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:57:27 CST 2025
;; MSG SIZE  rcvd: 106152.133.49.84.in-addr.arpa domain name pointer 152.84-49-133.nextgentel.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
152.133.49.84.in-addr.arpa	name = 152.84-49-133.nextgentel.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 94.102.49.190 | attackbotsspam | 3389BruteforceStormFW23 | 2019-10-01 06:51:45 | 
| 62.234.103.7 | attackbots | 2019-09-30T22:34:44.469487abusebot-7.cloudsearch.cf sshd\[24659\]: Invalid user 123456 from 62.234.103.7 port 58620 | 2019-10-01 06:54:12 | 
| 185.39.194.84 | attackspam | [portscan] Port scan | 2019-10-01 06:45:17 | 
| 129.154.67.65 | attack | Sep 30 18:34:35 ny01 sshd[834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.67.65 Sep 30 18:34:36 ny01 sshd[834]: Failed password for invalid user sejong79 from 129.154.67.65 port 35040 ssh2 Sep 30 18:39:20 ny01 sshd[1669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.67.65 | 2019-10-01 06:55:58 | 
| 80.191.140.28 | attackspam | fail2ban honeypot | 2019-10-01 06:31:34 | 
| 159.224.194.240 | attackspam | Invalid user abah from 159.224.194.240 port 38318 | 2019-10-01 06:32:38 | 
| 103.207.38.73 | attackspam | Oct 1 03:57:19 lcl-usvr-02 sshd[29304]: Invalid user admin from 103.207.38.73 port 55691 ... | 2019-10-01 06:59:56 | 
| 222.186.31.144 | attackbotsspam | Oct 1 00:51:39 MK-Soft-VM6 sshd[4880]: Failed password for root from 222.186.31.144 port 28330 ssh2 Oct 1 00:51:42 MK-Soft-VM6 sshd[4880]: Failed password for root from 222.186.31.144 port 28330 ssh2 ... | 2019-10-01 06:54:54 | 
| 121.227.179.84 | attackspam | Sep 30 22:57:33 host sshd\[55606\]: Invalid user kodi from 121.227.179.84 port 56853 Sep 30 22:57:33 host sshd\[55606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.227.179.84 ... | 2019-10-01 06:51:08 | 
| 222.186.52.89 | attackspam | Unauthorized access to SSH at 30/Sep/2019:22:46:13 +0000. Received: (SSH-2.0-PUTTY) | 2019-10-01 06:46:51 | 
| 51.38.179.179 | attackspam | auto-add | 2019-10-01 06:26:16 | 
| 217.7.239.117 | attackspambots | $f2bV_matches | 2019-10-01 06:35:01 | 
| 192.241.183.220 | attack | Oct 1 00:48:13 mail sshd\[24216\]: Invalid user db2inst1 from 192.241.183.220 port 39319 Oct 1 00:48:13 mail sshd\[24216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.183.220 Oct 1 00:48:14 mail sshd\[24216\]: Failed password for invalid user db2inst1 from 192.241.183.220 port 39319 ssh2 Oct 1 00:52:02 mail sshd\[24678\]: Invalid user eg from 192.241.183.220 port 45551 Oct 1 00:52:02 mail sshd\[24678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.183.220 | 2019-10-01 07:03:55 | 
| 54.37.21.211 | attackspambots | C1,WP GET /suche/wp-login.php | 2019-10-01 06:37:57 | 
| 113.141.28.106 | attack | Sep 30 11:23:25 tdfoods sshd\[26011\]: Invalid user user from 113.141.28.106 Sep 30 11:23:25 tdfoods sshd\[26011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.28.106 Sep 30 11:23:27 tdfoods sshd\[26011\]: Failed password for invalid user user from 113.141.28.106 port 24516 ssh2 Sep 30 11:27:06 tdfoods sshd\[26323\]: Invalid user user from 113.141.28.106 Sep 30 11:27:06 tdfoods sshd\[26323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.28.106 | 2019-10-01 06:35:48 |