City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.124.141.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.124.141.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 14:23:57 CST 2025
;; MSG SIZE rcvd: 106
54.141.124.93.in-addr.arpa domain name pointer 93-124-141-54.telia-isp.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.141.124.93.in-addr.arpa name = 93-124-141-54.telia-isp.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 201.86.15.11 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-24 07:18:07 |
| 83.220.169.94 | attackbots | WordPress brute force |
2020-02-24 07:06:32 |
| 77.223.142.162 | attackspam | WordPress brute force |
2020-02-24 07:08:26 |
| 112.3.30.37 | attack | Feb 23 23:55:37 [snip] sshd[22689]: Invalid user robi from 112.3.30.37 port 45504 Feb 23 23:55:37 [snip] sshd[22689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.37 Feb 23 23:55:40 [snip] sshd[22689]: Failed password for invalid user robi from 112.3.30.37 port 45504 ssh2[...] |
2020-02-24 06:57:20 |
| 107.173.222.105 | attackbots | WordPress brute force |
2020-02-24 06:41:33 |
| 51.89.21.206 | attack | 02/23/2020-17:48:26.482999 51.89.21.206 Protocol: 17 ET SCAN Sipvicious Scan |
2020-02-24 06:57:32 |
| 91.92.109.200 | attackspambots | WordPress brute force |
2020-02-24 07:00:30 |
| 118.185.94.157 | attackbotsspam | xmlrpc attack |
2020-02-24 06:47:21 |
| 92.63.196.3 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 3334 proto: TCP cat: Misc Attack |
2020-02-24 06:47:05 |
| 162.243.135.43 | attack | Unauthorized connection attempt from IP address 162.243.135.43 on Port 587(SMTP-MSA) |
2020-02-24 06:53:07 |
| 124.65.195.162 | attack | Feb 23 17:11:01 targaryen sshd[2691]: Invalid user ubuntu from 124.65.195.162 Feb 23 17:17:35 targaryen sshd[2737]: Invalid user www from 124.65.195.162 Feb 23 17:24:43 targaryen sshd[2782]: Invalid user eupa from 124.65.195.162 Feb 23 17:31:57 targaryen sshd[2864]: Invalid user test from 124.65.195.162 ... |
2020-02-24 06:54:50 |
| 52.23.16.34 | attackbots | WordPress brute force |
2020-02-24 07:17:51 |
| 52.58.198.153 | attackspam | WordPress brute force |
2020-02-24 07:16:52 |
| 91.158.59.2 | attack | WordPress brute force |
2020-02-24 07:03:35 |
| 149.56.44.47 | attack | pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.47 Failed password for invalid user python from 149.56.44.47 port 42406 ssh2 Failed password for invalid user python from 149.56.44.47 port 42406 ssh2 Failed password for invalid user python from 149.56.44.47 port 42406 ssh2 |
2020-02-24 06:49:19 |