City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.4.104.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.4.104.92. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 19:17:51 CST 2025
;; MSG SIZE rcvd: 105
Host 92.104.4.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 92.104.4.121.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 167.248.133.23 | attack |
|
2020-09-14 02:54:42 |
| 45.148.10.11 | attackspam | scans once in preceeding hours on the ports (in chronological order) 1900 resulting in total of 1 scans from 45.148.10.0/24 block. |
2020-09-14 02:43:26 |
| 111.229.167.91 | attackspam | Sep 13 19:33:42 sso sshd[8950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.167.91 Sep 13 19:33:44 sso sshd[8950]: Failed password for invalid user tina from 111.229.167.91 port 57700 ssh2 ... |
2020-09-14 03:04:21 |
| 45.241.166.142 | attackspam | 1599929438 - 09/12/2020 18:50:38 Host: 45.241.166.142/45.241.166.142 Port: 445 TCP Blocked |
2020-09-14 02:40:48 |
| 151.80.77.132 | attackspambots | Sep 13 20:19:34 nextcloud sshd\[22740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.77.132 user=root Sep 13 20:19:36 nextcloud sshd\[22740\]: Failed password for root from 151.80.77.132 port 53832 ssh2 Sep 13 20:25:26 nextcloud sshd\[28907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.77.132 user=root |
2020-09-14 02:56:28 |
| 46.162.12.37 | attack | [portscan] Port scan |
2020-09-14 03:15:27 |
| 52.130.85.214 | attackspam | Sep 13 13:22:35 r.ca sshd[21253]: Failed password for root from 52.130.85.214 port 56260 ssh2 |
2020-09-14 03:13:14 |
| 165.22.69.147 | attack | 2020-09-13T01:23:24.197139hostname sshd[31944]: Failed password for root from 165.22.69.147 port 57566 ssh2 ... |
2020-09-14 02:53:32 |
| 222.186.175.154 | attack | Sep 13 21:59:17 ift sshd\[48494\]: Failed password for root from 222.186.175.154 port 4938 ssh2Sep 13 21:59:27 ift sshd\[48494\]: Failed password for root from 222.186.175.154 port 4938 ssh2Sep 13 21:59:30 ift sshd\[48494\]: Failed password for root from 222.186.175.154 port 4938 ssh2Sep 13 21:59:36 ift sshd\[48508\]: Failed password for root from 222.186.175.154 port 14848 ssh2Sep 13 21:59:59 ift sshd\[48547\]: Failed password for root from 222.186.175.154 port 39986 ssh2 ... |
2020-09-14 03:01:25 |
| 159.65.176.156 | attackbotsspam | 2020-09-13T18:34:13.369463vps1033 sshd[8722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.176.156 2020-09-13T18:34:13.365047vps1033 sshd[8722]: Invalid user ervisor from 159.65.176.156 port 58614 2020-09-13T18:34:15.187252vps1033 sshd[8722]: Failed password for invalid user ervisor from 159.65.176.156 port 58614 ssh2 2020-09-13T18:37:42.880383vps1033 sshd[16178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.176.156 user=root 2020-09-13T18:37:45.392481vps1033 sshd[16178]: Failed password for root from 159.65.176.156 port 33322 ssh2 ... |
2020-09-14 02:48:46 |
| 20.36.194.79 | attackbots | srvr2: (mod_security) mod_security (id:934100) triggered by 20.36.194.79 (US/-/-): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/13 07:52:22 [error] 70302#0: *112258 [client 20.36.194.79] ModSecurity: Access denied with code 406 (phase 2). [file "/etc/modsecurity.d/REQUEST-934-APPLICATION-ATTACK-NODEJS.conf"] [line "48"] [id "934100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-javascript"] [tag "platform-multi"] [tag "attack-rce"] [tag "attack-injection-nodejs"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/242"] [redacted] [uri "/p/i/"] [unique_id "159997634234.076801"] [ref ""], client: 20.36.194.79, [redacted] request: "GET /p/i/?a=">&get=f_26&order=ASC&token=f1c6dd4b95196516b8a5cafed373733de1dafb9d HTTP/1.1" [redacted] |
2020-09-14 03:06:18 |
| 218.92.0.224 | attack | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-14 03:13:43 |
| 185.143.221.56 | attack | 2020-09-12 11:46:43.680988-0500 localhost screensharingd[64606]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 185.143.221.56 :: Type: VNC DES |
2020-09-14 03:07:05 |
| 45.248.69.92 | attackspam | prod11 ... |
2020-09-14 02:53:50 |
| 185.237.204.99 | attack | 20 attempts against mh-misbehave-ban on ship |
2020-09-14 03:11:24 |