City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.23.130.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.23.130.74. IN A
;; AUTHORITY SECTION:
. 238 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400
;; Query time: 426 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 01:18:08 CST 2022
;; MSG SIZE rcvd: 106
Host 74.130.23.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.130.23.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
61.177.172.128 | attack | Sep 5 23:00:15 sd-69548 sshd[847648]: Unable to negotiate with 61.177.172.128 port 4251: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Sep 5 23:18:50 sd-69548 sshd[848975]: Unable to negotiate with 61.177.172.128 port 16450: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-09-06 05:20:40 |
157.230.2.208 | attackspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-05T19:44:42Z and 2020-09-05T19:53:05Z |
2020-09-06 05:28:52 |
157.55.39.140 | attackbots | Automatic report - Banned IP Access |
2020-09-06 05:36:38 |
5.188.86.164 | attack | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-05T21:26:49Z |
2020-09-06 05:44:28 |
34.209.124.160 | attack | Lines containing failures of 34.209.124.160 auth.log:Sep 5 09:54:05 omfg sshd[14971]: Connection from 34.209.124.160 port 47182 on 78.46.60.42 port 22 auth.log:Sep 5 09:54:06 omfg sshd[14971]: Connection closed by 34.209.124.160 port 47182 [preauth] auth.log:Sep 5 09:54:07 omfg sshd[14973]: Connection from 34.209.124.160 port 48614 on 78.46.60.42 port 22 auth.log:Sep 5 09:54:07 omfg sshd[14973]: Unable to negotiate whostnameh 34.209.124.160 port 48614: no matching host key type found. Their offer: ecdsa-sha2-nistp384 [preauth] auth.log:Sep 5 09:54:08 omfg sshd[14975]: Connection from 34.209.124.160 port 49690 on 78.46.60.42 port 22 auth.log:Sep 5 09:54:09 omfg sshd[14975]: Unable to negotiate whostnameh 34.209.124.160 port 49690: no matching host key type found. Their offer: ecdsa-sha2-nistp521 [preauth] auth.log:Sep 5 09:54:10 omfg sshd[14977]: Connection from 34.209.124.160 port 50530 on 78.46.60.42 port 22 auth.log:Sep 5 09:54:11 omfg sshd[14977]: Connection c........ ------------------------------ |
2020-09-06 05:23:59 |
106.54.123.84 | attackbotsspam | 2020-09-05T17:43:49.862101shield sshd\[22121\]: Invalid user emily from 106.54.123.84 port 36456 2020-09-05T17:43:49.871337shield sshd\[22121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.123.84 2020-09-05T17:43:52.161300shield sshd\[22121\]: Failed password for invalid user emily from 106.54.123.84 port 36456 ssh2 2020-09-05T17:45:24.224832shield sshd\[22259\]: Invalid user zt from 106.54.123.84 port 52580 2020-09-05T17:45:24.234498shield sshd\[22259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.123.84 |
2020-09-06 05:19:56 |
45.142.120.183 | attackbots | Sep 5 23:16:42 [snip] postfix/submission/smtpd[32736]: warning: unknown[45.142.120.183]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 23:17:25 [snip] postfix/submission/smtpd[32736]: warning: unknown[45.142.120.183]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 23:17:50 [snip] postfix/submission/smtpd[32736]: warning: unknown[45.142.120.183]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 23:18:25 [snip] postfix/submission/smtpd[32736]: warning: unknown[45.142.120.183]: SASL LOGIN authentication failed: VXNlcm5hbWU6 Sep 5 23:19:03 [snip] postfix/submission/smtpd[32736]: warning: unknown[45.142.120.183]: SASL LOGIN authentication failed: UGFzc3dvcmQ6[...] |
2020-09-06 05:45:16 |
162.214.111.167 | attackbots | " " |
2020-09-06 05:22:34 |
98.159.99.58 | attackspam | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-05T17:55:46Z |
2020-09-06 05:48:46 |
165.90.3.122 | attack | [Sun Sep 06 03:13:25.153543 2020] [:error] [pid 2754:tid 140397330274048] [client 165.90.3.122:65500] [client 165.90.3.122] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "972"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/POLICY/PROTOCOL_NOT_ALLOWED"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "X1PxZdlmuncnyx65RuMHlQAAAGU"] ... |
2020-09-06 05:24:44 |
45.143.223.106 | attackbotsspam | [2020-09-05 17:13:14] NOTICE[1194][C-00000f3f] chan_sip.c: Call from '' (45.143.223.106:63929) to extension '00441904911024' rejected because extension not found in context 'public'. [2020-09-05 17:13:14] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-05T17:13:14.866-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441904911024",SessionID="0x7f2ddc0f4e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.223.106/63929",ACLName="no_extension_match" [2020-09-05 17:13:47] NOTICE[1194][C-00000f41] chan_sip.c: Call from '' (45.143.223.106:49698) to extension '011441904911024' rejected because extension not found in context 'public'. [2020-09-05 17:13:47] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-05T17:13:47.677-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441904911024",SessionID="0x7f2ddc1b7848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP ... |
2020-09-06 05:22:48 |
5.188.206.194 | attack | Sep 5 23:27:25 ncomp postfix/smtpd[8896]: warning: unknown[5.188.206.194]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 23:27:51 ncomp postfix/smtpd[8896]: warning: unknown[5.188.206.194]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 23:28:03 ncomp postfix/smtpd[8896]: warning: unknown[5.188.206.194]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-09-06 05:35:31 |
62.171.177.122 | attackspambots | Wordpress_xmlrpc_attack |
2020-09-06 05:19:01 |
182.122.68.93 | attack | Sep 4 18:37:38 www sshd[31209]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.122.68.93] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 4 18:37:38 www sshd[31209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.68.93 user=r.r Sep 4 18:37:40 www sshd[31209]: Failed password for r.r from 182.122.68.93 port 8412 ssh2 Sep 4 18:37:40 www sshd[31209]: Received disconnect from 182.122.68.93: 11: Bye Bye [preauth] Sep 4 18:47:18 www sshd[31678]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.122.68.93] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 4 18:47:18 www sshd[31678]: Invalid user admin from 182.122.68.93 Sep 4 18:47:18 www sshd[31678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.68.93 Sep 4 18:47:20 www sshd[31678]: Failed password for invalid user admin from 182.122.68.93 port 59448 ssh2 Sep 4 18:47:21 www sshd[31678]: Received disconnec........ ------------------------------- |
2020-09-06 05:33:51 |
206.189.28.69 | attackspam | Port Scan ... |
2020-09-06 05:24:26 |