City: unknown
Region: unknown
Country: Netherlands (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.122.15.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51762
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.122.15.152.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 21:29:34 CST 2025
;; MSG SIZE  rcvd: 107
        Host 152.15.122.139.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 152.15.122.139.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 211.159.172.184 | attack | 20 attempts against mh-ssh on ice  | 
                    2020-09-13 04:56:52 | 
| 197.60.153.190 | attackbotsspam | 1599929951 - 09/12/2020 23:59:11 Host: host-197.60.153.190.tedata.net/197.60.153.190 Port: 23 TCP Blocked ...  | 
                    2020-09-13 04:54:08 | 
| 222.186.173.215 | attackbots | Sep 12 21:33:50 ajax sshd[32078]: Failed password for root from 222.186.173.215 port 1094 ssh2 Sep 12 21:33:54 ajax sshd[32078]: Failed password for root from 222.186.173.215 port 1094 ssh2  | 
                    2020-09-13 04:44:47 | 
| 202.131.69.18 | attack | Sep 12 13:09:18 propaganda sshd[26980]: Connection from 202.131.69.18 port 32887 on 10.0.0.161 port 22 rdomain "" Sep 12 13:09:18 propaganda sshd[26980]: Connection closed by 202.131.69.18 port 32887 [preauth]  | 
                    2020-09-13 04:19:09 | 
| 49.233.152.7 | attack | 
  | 
                    2020-09-13 04:36:00 | 
| 111.119.177.28 | attackspambots | Automatic report - Port Scan Attack  | 
                    2020-09-13 04:26:44 | 
| 78.128.113.120 | attack | 2020-09-12 22:45:28 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data \(set_id=info@orogest.it\) 2020-09-12 22:45:36 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data 2020-09-12 22:45:44 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data 2020-09-12 22:45:50 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data 2020-09-12 22:46:02 dovecot_login authenticator failed for \(ip-113-120.4vendeta.com.\) \[78.128.113.120\]: 535 Incorrect authentication data  | 
                    2020-09-13 04:53:38 | 
| 5.188.62.140 | attackbotsspam | Trying to log into my security cameras.  | 
                    2020-09-13 04:58:23 | 
| 85.193.105.131 | attackbotsspam | [SatSep1218:59:29.3808252020][:error][pid28505:tid47701851145984][client85.193.105.131:27159][client85.193.105.131]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"connector\\\\\\\\.minimal\\\\\\\\.php"atREQUEST_URI.[file"/usr/local/apache.ea3/conf/modsec_rules/99_asl_jitp.conf"][line"321"][id"393781"][rev"1"][msg"Atomicorp.comWAFRules-VirtualJustInTimePatch:WordPressFileManagerPluginattackblocked"][hostname"cser.ch"][uri"/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php"][unique_id"X1z@cTbbrScj3AJnEXcdzgAAAEk"]\,referer:http://cser.ch/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php[SatSep1218:59:31.6406472020][:error][pid28728:tid47701842740992][client85.193.105.131:24220][client85.193.105.131]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"connector\\\\\\\\.minimal\\\\\\\\.php"atREQUEST_URI.[file"/usr/local/apache.ea3/conf/modsec_rules/99_asl_jitp.conf"][line"321"][id"393781"][rev"1"][msg"Atomicorp.comWAFRules-VirtualJustInTi  | 
                    2020-09-13 04:40:21 | 
| 211.100.61.29 | attackspam | port scan and connect, tcp 1433 (ms-sql-s)  | 
                    2020-09-13 04:27:57 | 
| 218.92.0.249 | attack | Brute force attempt  | 
                    2020-09-13 04:24:07 | 
| 106.12.176.2 | attack | 
  | 
                    2020-09-13 04:50:34 | 
| 196.52.43.119 | attack | Unauthorized connection attempt from IP address 196.52.43.119 on port 995  | 
                    2020-09-13 04:38:22 | 
| 94.102.51.28 | attack | [H1.VM4] Blocked by UFW  | 
                    2020-09-13 04:45:53 | 
| 179.187.129.104 | attackspam | Sep 12 20:05:52 *** sshd[30459]: Invalid user map from 179.187.129.104  | 
                    2020-09-13 04:34:19 |