City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 107.152.192.145 | attackspambots | (From whitlow.retha@gmail.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com |
2020-07-24 23:07:28 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.152.192.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.152.192.7. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 149 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:49:48 CST 2022
;; MSG SIZE rcvd: 106
7.192.152.107.in-addr.arpa domain name pointer ffe61.westemberg.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
7.192.152.107.in-addr.arpa name = ffe61.westemberg.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.224.129.237 | attackbots | 1602189895 - 10/09/2020 03:44:55 Host: 122.224.129.237/122.224.129.237 Port: 21 TCP Blocked ... |
2020-10-10 01:12:28 |
| 37.57.18.232 | attackbots | Unauthorized connection attempt from IP address 37.57.18.232 on Port 445(SMB) |
2020-10-10 00:52:53 |
| 141.98.9.34 | attack | Bruteforce detected by fail2ban |
2020-10-10 01:09:38 |
| 119.28.19.237 | attackspambots | 119.28.19.237 (HK/Hong Kong/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 9 18:07:30 server sshd[7426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.19.237 user=root Oct 9 18:07:32 server sshd[7426]: Failed password for root from 119.28.19.237 port 42570 ssh2 Oct 9 18:08:08 server sshd[7512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.89.140 user=root Oct 9 18:07:11 server sshd[7393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.233.195.250 user=root Oct 9 18:07:13 server sshd[7393]: Failed password for root from 191.233.195.250 port 51442 ssh2 Oct 9 17:55:48 server sshd[5424]: Failed password for root from 27.71.231.81 port 47882 ssh2 IP Addresses Blocked: |
2020-10-10 00:44:15 |
| 191.189.10.16 | attack | Unauthorized connection attempt from IP address 191.189.10.16 on Port 445(SMB) |
2020-10-10 00:36:42 |
| 123.207.99.184 | attackbots | Oct 9 08:49:48 ws26vmsma01 sshd[155034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.99.184 Oct 9 08:49:50 ws26vmsma01 sshd[155034]: Failed password for invalid user carol from 123.207.99.184 port 58057 ssh2 ... |
2020-10-10 01:06:08 |
| 92.21.41.249 | attackbotsspam | Automatic report - Port Scan Attack |
2020-10-10 00:47:44 |
| 72.253.212.30 | attack | SS5,Magento Bruteforce Login Attack POST /index.php/admin/ |
2020-10-10 00:56:07 |
| 161.97.83.184 | attack | failed root login |
2020-10-10 00:46:49 |
| 34.101.245.236 | attackspam | 2020-10-09 18:31:02,874 fail2ban.actions: WARNING [ssh] Ban 34.101.245.236 |
2020-10-10 01:08:35 |
| 112.85.42.183 | attackbotsspam | Tried our host z. |
2020-10-10 00:35:13 |
| 51.15.108.244 | attackbots | 2020-10-09 04:42:39.077765-0500 localhost sshd[65336]: Failed password for root from 51.15.108.244 port 48374 ssh2 |
2020-10-10 01:01:38 |
| 113.163.189.112 | attack | Unauthorized connection attempt from IP address 113.163.189.112 on Port 445(SMB) |
2020-10-10 00:41:08 |
| 77.247.181.162 | attackspambots | uvcm 77.247.181.162 [08/Oct/2020:16:24:34 "https://www.google.com/" "POST /xmlrpc.php 200 756 77.247.181.162 [09/Oct/2020:07:56:58 "-" "POST /xmlrpc.php 403 391 77.247.181.162 [09/Oct/2020:22:54:11 "https://www.google.com/" "POST /xmlrpc.php 200 4080 |
2020-10-10 01:04:29 |
| 218.92.0.185 | attackbots | Oct 9 19:44:58 dignus sshd[1372]: error: maximum authentication attempts exceeded for root from 218.92.0.185 port 17115 ssh2 [preauth] Oct 9 19:45:02 dignus sshd[1374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.185 user=root Oct 9 19:45:04 dignus sshd[1374]: Failed password for root from 218.92.0.185 port 45348 ssh2 Oct 9 19:45:10 dignus sshd[1374]: Failed password for root from 218.92.0.185 port 45348 ssh2 Oct 9 19:45:14 dignus sshd[1374]: Failed password for root from 218.92.0.185 port 45348 ssh2 ... |
2020-10-10 00:45:24 |