City: unknown
Region: unknown
Country: United States
Internet Service Provider: DigitalOcean LLC
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackspam | [MonAug3114:30:24.4027642020][:error][pid31598:tid46926426830592][client138.197.111.46:54372][client138.197.111.46]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"Datanyze"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"75"][id"337749"][rev"2"][msg"Atomicorp.comWAFRules:Datanyzebotblocked"][severity"ERROR"][hostname"bluwater.ch"][uri"/"][unique_id"X0ztYMJaKA1W6PC3WP5EFwAAABY"][MonAug3114:30:25.8195442020][:error][pid31533:tid46926341015296][client138.197.111.46:54404][client138.197.111.46]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"Datanyze"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"75"][id"337749"][rev"2"][msg"Atomicorp.comWAFRules:Datanyzebotblocked"][severity"ERROR"][hostname"www.bluwater.ch"][uri"/"][unique_id"X0ztYfBlK8X-3pwihKqvQQAAAU4"] |
2020-09-01 03:12:19 |
IP | Type | Details | Datetime |
---|---|---|---|
138.197.111.27 | attackspambots | [SunJul1402:36:55.6554802019][:error][pid23192:tid47213052991232][client138.197.111.27:47008][client138.197.111.27]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"Datanyze"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"68"][id"337749"][rev"2"][msg"Atomicorp.comWAFRules:Datanyzebotblocked"][severity"ERROR"][hostname"boltonholding.com"][uri"/"][unique_id"XSp5J2cw4itg5ktxnXdL1AAAAJI"][SunJul1402:36:56.9632132019][:error][pid23058:tid47212899911424][client138.197.111.27:58222][client138.197.111.27]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"Datanyze"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"68"][id"337749"][rev"2"][msg"Atomicorp.comWAFRules:Datanyzebotblocked"][severity"ERROR"][hostname"boltonholding.com"][uri"/"][unique_id"XSp5KFEssWsPNfAw37IcYAAAAAE"] |
2019-07-14 12:18:19 |
138.197.111.123 | attack | [SunJun3015:17:25.5933962019][:error][pid26388:tid47523395413760][client138.197.111.123:40096][client138.197.111.123]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"Datanyze"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"68"][id"337749"][rev"2"][msg"Atomicorp.comWAFRules:Datanyzebotblocked"][severity"ERROR"][hostname"yex-swiss.ch"][uri"/"][unique_id"XRi2ZRnQjmXhtkhIr-U05wAAAAY"][SunJun3015:17:27.7005562019][:error][pid26388:tid47523309262592][client138.197.111.123:55414][client138.197.111.123]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"Datanyze"atREQUEST_HEADERS:User-Agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"68"][id"337749"][rev"2"][msg"Atomicorp.comWAFRules:Datanyzebotblocked"][severity"ERROR"][hostname"yex-swiss.ch"][uri"/"][unique_id"XRi2ZxnQjmXhtkhIr-U06AAAAAE"] |
2019-07-01 03:10:37 |
138.197.111.113 | attack | 30.06.2019 05:47:19 - Bad Robot Ignore Robots.txt |
2019-06-30 12:08:14 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.111.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.197.111.46. IN A
;; AUTHORITY SECTION:
. 241 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020083101 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 01 03:12:15 CST 2020
;; MSG SIZE rcvd: 118
Host 46.111.197.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 46.111.197.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
154.221.21.141 | attack | Oct 21 20:05:41 work-partkepr sshd\[14447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.21.141 user=root Oct 21 20:05:43 work-partkepr sshd\[14447\]: Failed password for root from 154.221.21.141 port 60272 ssh2 ... |
2019-10-22 05:11:44 |
175.175.2.78 | attackspambots | Seq 2995002506 |
2019-10-22 04:55:25 |
160.119.181.92 | attack | 2019-10-21 x@x 2019-10-21 20:00:33 unexpected disconnection while reading SMTP command from ([160.119.181.92]) [160.119.181.92]:30150 I=[10.100.18.22]:25 (error: Connection reset by peer) 2019-10-21 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=160.119.181.92 |
2019-10-22 05:16:12 |
167.71.241.174 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-22 05:13:34 |
5.166.253.108 | attackbots | Chat Spam |
2019-10-22 05:01:06 |
84.224.45.210 | attackspambots | 2019-10-21 x@x 2019-10-21 21:14:30 unexpected disconnection while reading SMTP command from netacc-gpn-4-45-210.pool.telenor.hu [84.224.45.210]:31961 I=[10.100.18.21]:25 (error: Connection reset by peer) 2019-10-21 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=84.224.45.210 |
2019-10-22 04:57:54 |
191.7.195.122 | attackbots | Postfix SMTP rejection ... |
2019-10-22 05:06:26 |
60.217.104.229 | attackspam | Seq 2995002506 |
2019-10-22 04:58:36 |
27.38.20.247 | attackspam | Seq 2995002506 |
2019-10-22 04:53:04 |
186.225.63.206 | attackbotsspam | SSH invalid-user multiple login attempts |
2019-10-22 05:08:58 |
78.220.13.56 | attackbots | Seq 2995002506 |
2019-10-22 04:44:35 |
91.237.202.144 | attack | Chat Spam |
2019-10-22 05:16:30 |
192.207.205.98 | attackbots | 2019-10-21T22:05:43.683611scmdmz1 sshd\[17147\]: Invalid user leica from 192.207.205.98 port 38355 2019-10-21T22:05:43.687127scmdmz1 sshd\[17147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.207.205.98 2019-10-21T22:05:46.268325scmdmz1 sshd\[17147\]: Failed password for invalid user leica from 192.207.205.98 port 38355 ssh2 ... |
2019-10-22 05:07:29 |
177.152.113.220 | attackbots | 2019-10-21 x@x 2019-10-21 21:30:02 unexpected disconnection while reading SMTP command from 177-152-113-220.host.webda.com.br [177.152.113.220]:38378 I=[10.100.18.22]:25 (error: Connection reset by peer) 2019-10-21 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=177.152.113.220 |
2019-10-22 05:09:15 |
27.42.142.252 | attackspambots | Seq 2995002506 |
2019-10-22 04:52:45 |