City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: PT. Mega Artha Lintas Data
Hostname: unknown
Organization: unknown
Usage Type: Commercial
Type | Details | Datetime |
---|---|---|
attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-19 02:37:27 |
IP | Type | Details | Datetime |
---|---|---|---|
103.105.54.76 | attackspam | srvr1: (mod_security) mod_security (id:942100) triggered by 103.105.54.76 (ID/-/103-105-54-76.megadata.net.id): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:05:20 [error] 482759#0: *840549 [client 103.105.54.76] ModSecurity: Access denied with code 406 (phase 2). [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801152043.928417"] [ref ""], client: 103.105.54.76, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%27%29+OR+++%288559%3D0 HTTP/1.1" [redacted] |
2020-08-21 23:06:22 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.105.54.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42233
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.105.54.137. IN A
;; AUTHORITY SECTION:
. 466 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020021802 1800 900 604800 86400
;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 02:37:24 CST 2020
;; MSG SIZE rcvd: 118
137.54.105.103.in-addr.arpa domain name pointer 103-105-54-137.megadata.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
137.54.105.103.in-addr.arpa name = 103-105-54-137.megadata.net.id.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
201.48.40.153 | attack | Jun 3 13:47:58 server sshd[3332]: Failed password for root from 201.48.40.153 port 52695 ssh2 Jun 3 13:52:20 server sshd[7467]: Failed password for root from 201.48.40.153 port 54759 ssh2 Jun 3 13:56:44 server sshd[11067]: Failed password for root from 201.48.40.153 port 56822 ssh2 |
2020-06-03 20:54:14 |
82.100.239.100 | attackbots | Brute forcing RDP port 3389 |
2020-06-03 20:38:47 |
222.186.42.136 | attackbotsspam | 2020-06-03T12:30:16.171114abusebot-4.cloudsearch.cf sshd[3968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136 user=root 2020-06-03T12:30:18.199339abusebot-4.cloudsearch.cf sshd[3968]: Failed password for root from 222.186.42.136 port 38088 ssh2 2020-06-03T12:30:20.732377abusebot-4.cloudsearch.cf sshd[3968]: Failed password for root from 222.186.42.136 port 38088 ssh2 2020-06-03T12:30:16.171114abusebot-4.cloudsearch.cf sshd[3968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136 user=root 2020-06-03T12:30:18.199339abusebot-4.cloudsearch.cf sshd[3968]: Failed password for root from 222.186.42.136 port 38088 ssh2 2020-06-03T12:30:20.732377abusebot-4.cloudsearch.cf sshd[3968]: Failed password for root from 222.186.42.136 port 38088 ssh2 2020-06-03T12:30:32.524972abusebot-4.cloudsearch.cf sshd[3984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser ... |
2020-06-03 20:31:48 |
171.100.122.221 | attackbots | Automatic report - Port Scan Attack |
2020-06-03 20:12:44 |
182.253.184.20 | attackspambots | 2020-06-03T07:19:03.8921671495-001 sshd[61272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.184.20 user=root 2020-06-03T07:19:05.9811771495-001 sshd[61272]: Failed password for root from 182.253.184.20 port 35506 ssh2 2020-06-03T07:23:08.8333441495-001 sshd[61506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.184.20 user=root 2020-06-03T07:23:11.2221421495-001 sshd[61506]: Failed password for root from 182.253.184.20 port 40090 ssh2 2020-06-03T07:38:36.8338791495-001 sshd[62189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.184.20 user=root 2020-06-03T07:38:38.9532841495-001 sshd[62189]: Failed password for root from 182.253.184.20 port 51138 ssh2 ... |
2020-06-03 20:34:01 |
111.67.197.173 | attack | 2020-06-03T12:22:02.956651shield sshd\[5769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.197.173 user=root 2020-06-03T12:22:04.501927shield sshd\[5769\]: Failed password for root from 111.67.197.173 port 33424 ssh2 2020-06-03T12:23:16.018120shield sshd\[6001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.197.173 user=root 2020-06-03T12:23:17.720204shield sshd\[6001\]: Failed password for root from 111.67.197.173 port 45988 ssh2 2020-06-03T12:24:32.373439shield sshd\[6149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.197.173 user=root |
2020-06-03 20:27:29 |
5.182.39.62 | attackbots | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-03T11:09:06Z and 2020-06-03T11:56:49Z |
2020-06-03 20:51:47 |
182.61.108.64 | attack | Jun 3 14:08:57 abendstille sshd\[6639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.64 user=root Jun 3 14:09:00 abendstille sshd\[6639\]: Failed password for root from 182.61.108.64 port 47920 ssh2 Jun 3 14:11:13 abendstille sshd\[8856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.64 user=root Jun 3 14:11:15 abendstille sshd\[8856\]: Failed password for root from 182.61.108.64 port 53280 ssh2 Jun 3 14:13:40 abendstille sshd\[11405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.64 user=root ... |
2020-06-03 20:20:28 |
219.250.188.106 | attack | Jun 3 11:53:15 jumpserver sshd[59093]: Failed password for root from 219.250.188.106 port 51748 ssh2 Jun 3 11:57:33 jumpserver sshd[59119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.106 user=root Jun 3 11:57:34 jumpserver sshd[59119]: Failed password for root from 219.250.188.106 port 53239 ssh2 ... |
2020-06-03 20:17:14 |
152.0.56.54 | attack | Brute forcing RDP port 3389 |
2020-06-03 20:38:11 |
222.186.175.167 | attack | Jun 3 05:11:50 debian sshd[6808]: Unable to negotiate with 222.186.175.167 port 64742: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Jun 3 08:40:06 debian sshd[28933]: Unable to negotiate with 222.186.175.167 port 33124: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-06-03 20:43:54 |
218.92.0.168 | attackbotsspam | Jun 3 14:06:51 PorscheCustomer sshd[5070]: Failed password for root from 218.92.0.168 port 33953 ssh2 Jun 3 14:06:55 PorscheCustomer sshd[5070]: Failed password for root from 218.92.0.168 port 33953 ssh2 Jun 3 14:06:58 PorscheCustomer sshd[5070]: Failed password for root from 218.92.0.168 port 33953 ssh2 Jun 3 14:07:05 PorscheCustomer sshd[5070]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 33953 ssh2 [preauth] ... |
2020-06-03 20:20:00 |
185.143.221.7 | attackbots | 06/03/2020-07:57:24.885400 185.143.221.7 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-03 20:27:15 |
68.183.230.117 | attackspam | Jun 3 02:09:37 web1 sshd\[22859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.117 user=root Jun 3 02:09:39 web1 sshd\[22859\]: Failed password for root from 68.183.230.117 port 48928 ssh2 Jun 3 02:13:46 web1 sshd\[23241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.117 user=root Jun 3 02:13:47 web1 sshd\[23241\]: Failed password for root from 68.183.230.117 port 54534 ssh2 Jun 3 02:17:41 web1 sshd\[23551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.117 user=root |
2020-06-03 20:18:10 |
222.186.175.163 | attackspambots | Jun 3 22:27:25 web1 sshd[17983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Jun 3 22:27:26 web1 sshd[17983]: Failed password for root from 222.186.175.163 port 23284 ssh2 Jun 3 22:27:25 web1 sshd[17980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Jun 3 22:27:26 web1 sshd[17980]: Failed password for root from 222.186.175.163 port 28628 ssh2 Jun 3 22:27:25 web1 sshd[17983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Jun 3 22:27:26 web1 sshd[17983]: Failed password for root from 222.186.175.163 port 23284 ssh2 Jun 3 22:27:30 web1 sshd[17983]: Failed password for root from 222.186.175.163 port 23284 ssh2 Jun 3 22:27:25 web1 sshd[17983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Jun 3 22:27:26 web1 ... |
2020-06-03 20:29:53 |