City: Strommen
Region: Akershus
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: Tele Danmark
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.77.41.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32971
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;128.77.41.24. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019073101 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 01 03:34:15 CST 2019
;; MSG SIZE rcvd: 116
24.41.77.128.in-addr.arpa domain name pointer cm-128.77.41.24.getinternet.no.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
24.41.77.128.in-addr.arpa name = cm-128.77.41.24.getinternet.no.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.86.164.103 | attackbotsspam | are-Joomla Authentification : try to force the door... |
2020-08-22 03:21:53 |
| 193.35.48.18 | attack | Aug 21 21:17:45 srv01 postfix/smtpd\[10101\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 21 21:18:07 srv01 postfix/smtpd\[24734\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 21 21:20:08 srv01 postfix/smtpd\[10101\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 21 21:20:29 srv01 postfix/smtpd\[24849\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 21 21:25:22 srv01 postfix/smtpd\[25066\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-08-22 03:53:02 |
| 105.235.197.162 | attackspam | srvr1: (mod_security) mod_security (id:942100) triggered by 105.235.197.162 (NG/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:00:51 [error] 482759#0: *840010 [client 105.235.197.162] ModSecurity: Access denied with code 406 (phase 2). [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801125156.731211"] [ref ""], client: 105.235.197.162, [redacted] request: "GET /forum/viewthread.php?thread_id=1122+OR+JSON_KEYS%28%28SELECT+CONVERT%28%28SELECT+CONCAT%280x3752344a766c%2C%28SELECT+%28ELT%282836%3D2836%2C1%29%29%29%2C0x3752344a766c%29%29+USING+utf8%29%29%29%23+EnOK HTTP/1.1" [redacted] |
2020-08-22 03:51:55 |
| 103.79.169.157 | attackbots | Unauthorized connection attempt from IP address 103.79.169.157 on Port 445(SMB) |
2020-08-22 03:31:56 |
| 213.194.148.13 | attackspam | Unauthorized connection attempt from IP address 213.194.148.13 on Port 445(SMB) |
2020-08-22 03:23:57 |
| 103.200.22.187 | attackspambots | 103.200.22.187 - - [21/Aug/2020:19:51:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2387 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.200.22.187 - - [21/Aug/2020:19:51:44 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.200.22.187 - - [21/Aug/2020:19:51:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-22 03:23:01 |
| 14.232.160.197 | attack | srvr1: (mod_security) mod_security (id:942100) triggered by 14.232.160.197 (VN/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:01:07 [error] 482759#0: *840041 [client 14.232.160.197] ModSecurity: Access denied with code 406 (phase 2). [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801126769.162945"] [ref ""], client: 14.232.160.197, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%29+OR+1+GROUP+BY+CONCAT%280x43644a577173%2C%28SELECT+%28ELT%282836%3D2836%2C1%29%29%29%2C0x43644a577173%2CFLOOR%28RAND%280%29%2A2%29%29+HAVING+MIN%280%29%23%23+EjlK HTTP/1.1" [redacted] |
2020-08-22 03:33:07 |
| 49.49.245.40 | attack | Unauthorized connection attempt from IP address 49.49.245.40 on Port 445(SMB) |
2020-08-22 03:34:33 |
| 85.105.142.73 | attack | Unauthorized connection attempt from IP address 85.105.142.73 on Port 445(SMB) |
2020-08-22 03:19:08 |
| 154.117.157.180 | attackspam | srvr1: (mod_security) mod_security (id:942100) triggered by 154.117.157.180 (ZA/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:01:27 [error] 482759#0: *840078 [client 154.117.157.180] ModSecurity: Access denied with code 406 (phase 2). [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801128782.146681"] [ref ""], client: 154.117.157.180, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%29+AND+EXP%28~%28SELECT+%2A+FROM+%28SELECT+CONCAT%280x34344c4f5a37%2C%28SELECT+%28ELT%282836%3D2836%2C1%29%29%29%2C0x34344c4f5a37%2C0x78%29%29x%29%29--+ML7a HTTP/1.1" [redacted] |
2020-08-22 03:20:39 |
| 187.142.109.135 | attackspambots | Unauthorized connection attempt from IP address 187.142.109.135 on Port 445(SMB) |
2020-08-22 03:56:59 |
| 174.138.20.163 | attack | Aug 21 19:03:19 email sshd\[2609\]: Invalid user 0 from 174.138.20.163 Aug 21 19:03:19 email sshd\[2609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.163 Aug 21 19:03:20 email sshd\[2610\]: Invalid user 0 from 174.138.20.163 Aug 21 19:03:20 email sshd\[2610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.163 Aug 21 19:03:22 email sshd\[2609\]: Failed password for invalid user 0 from 174.138.20.163 port 39114 ssh2 ... |
2020-08-22 03:25:35 |
| 121.48.164.31 | attackspam | Aug 21 14:19:26 myvps sshd[19637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.48.164.31 Aug 21 14:19:28 myvps sshd[19637]: Failed password for invalid user vna from 121.48.164.31 port 38646 ssh2 Aug 21 14:34:09 myvps sshd[28838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.48.164.31 ... |
2020-08-22 03:24:29 |
| 159.65.30.66 | attack | 2020-08-21T15:30:06+0000 Failed SSH Authentication/Brute Force Attack. (Server 6) |
2020-08-22 03:45:58 |
| 49.145.59.79 | attack | Unauthorized connection attempt from IP address 49.145.59.79 on Port 445(SMB) |
2020-08-22 03:40:15 |