City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.1.63.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.1.63.207. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:46:03 CST 2025
;; MSG SIZE rcvd: 105
Host 207.63.1.141.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 207.63.1.141.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.235.138.168 | attackspambots | 2020-08-07T13:57:55.664607amanda2.illicoweb.com sshd\[42522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.168 user=root 2020-08-07T13:57:58.218589amanda2.illicoweb.com sshd\[42522\]: Failed password for root from 49.235.138.168 port 40704 ssh2 2020-08-07T14:03:31.251234amanda2.illicoweb.com sshd\[43533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.168 user=root 2020-08-07T14:03:33.263390amanda2.illicoweb.com sshd\[43533\]: Failed password for root from 49.235.138.168 port 59944 ssh2 2020-08-07T14:06:05.078914amanda2.illicoweb.com sshd\[43972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.168 user=root ... |
2020-08-07 22:48:30 |
| 112.85.42.104 | attackspam | Aug 7 07:59:48 dignus sshd[18951]: Failed password for root from 112.85.42.104 port 44413 ssh2 Aug 7 07:59:50 dignus sshd[18951]: Failed password for root from 112.85.42.104 port 44413 ssh2 Aug 7 07:59:55 dignus sshd[18982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104 user=root Aug 7 07:59:57 dignus sshd[18982]: Failed password for root from 112.85.42.104 port 34269 ssh2 Aug 7 08:00:00 dignus sshd[18982]: Failed password for root from 112.85.42.104 port 34269 ssh2 ... |
2020-08-07 23:05:37 |
| 51.77.150.203 | attackspam | Aug 7 15:25:40 lnxmysql61 sshd[28761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.150.203 |
2020-08-07 23:24:05 |
| 120.132.12.162 | attackbots | k+ssh-bruteforce |
2020-08-07 22:50:03 |
| 182.38.124.193 | attackspam | Aug 7 10:08:37 garuda postfix/smtpd[4086]: connect from unknown[182.38.124.193] Aug 7 10:08:37 garuda postfix/smtpd[4161]: connect from unknown[182.38.124.193] Aug 7 10:08:38 garuda postfix/smtpd[4161]: warning: unknown[182.38.124.193]: SASL LOGIN authentication failed: authentication failure Aug 7 10:08:39 garuda postfix/smtpd[4161]: lost connection after AUTH from unknown[182.38.124.193] Aug 7 10:08:39 garuda postfix/smtpd[4161]: disconnect from unknown[182.38.124.193] ehlo=1 auth=0/1 commands=1/2 Aug 7 10:08:39 garuda postfix/smtpd[4161]: connect from unknown[182.38.124.193] Aug 7 10:08:40 garuda postfix/smtpd[4161]: warning: unknown[182.38.124.193]: SASL LOGIN authentication failed: authentication failure Aug 7 10:08:41 garuda postfix/smtpd[4161]: lost connection after AUTH from unknown[182.38.124.193] Aug 7 10:08:41 garuda postfix/smtpd[4161]: disconnect from unknown[182.38.124.193] ehlo=1 auth=0/1 commands=1/2 Aug 7 10:08:42 garuda postfix/smtpd[4161]: c........ ------------------------------- |
2020-08-07 23:21:52 |
| 110.12.4.86 | attack | 2020-08-07T14:07:20.710155git sshd[306384]: User root from 110.12.4.86 not allowed because none of user's groups are listed in AllowGroups 2020-08-07T14:07:21.466123git sshd[306386]: Connection from 110.12.4.86 port 36429 on 95.216.204.133 port 22 rdomain "" 2020-08-07T14:07:22.941603git sshd[306386]: User root from 110.12.4.86 not allowed because none of user's groups are listed in AllowGroups 2020-08-07T14:07:23.721898git sshd[306388]: Connection from 110.12.4.86 port 36690 on 95.216.204.133 port 22 rdomain "" 2020-08-07T14:07:25.612381git sshd[306388]: User root from 110.12.4.86 not allowed because none of user's groups are listed in AllowGroups 2020-08-07T14:07:26.484447git sshd[306390]: Connection from 110.12.4.86 port 60756 on 95.216.204.133 port 22 rdomain "" 2020-08-07T14:07:28.530510git sshd[306390]: User root from 110.12.4.86 not allowed because none of user's groups are listed in AllowGroups 2020-08-07T14:07:29.210402git sshd[306392]: Connection from 110.12.4.86 port 32833 o ... |
2020-08-07 22:52:04 |
| 191.232.242.173 | attack | Aug 7 13:07:40 ns3033917 sshd[5507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.242.173 Aug 7 13:07:40 ns3033917 sshd[5507]: Invalid user ubuntu from 191.232.242.173 port 44302 Aug 7 13:07:42 ns3033917 sshd[5507]: Failed password for invalid user ubuntu from 191.232.242.173 port 44302 ssh2 ... |
2020-08-07 22:54:00 |
| 45.129.33.10 | attack | [H1.VM6] Blocked by UFW |
2020-08-07 23:25:46 |
| 134.175.99.237 | attackspam | Aug 7 13:40:27 Ubuntu-1404-trusty-64-minimal sshd\[30422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.99.237 user=root Aug 7 13:40:29 Ubuntu-1404-trusty-64-minimal sshd\[30422\]: Failed password for root from 134.175.99.237 port 51318 ssh2 Aug 7 13:58:50 Ubuntu-1404-trusty-64-minimal sshd\[8874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.99.237 user=root Aug 7 13:58:52 Ubuntu-1404-trusty-64-minimal sshd\[8874\]: Failed password for root from 134.175.99.237 port 52182 ssh2 Aug 7 14:05:32 Ubuntu-1404-trusty-64-minimal sshd\[16660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.99.237 user=root |
2020-08-07 23:26:14 |
| 109.227.63.3 | attackbots | SSH Brute Force |
2020-08-07 22:38:53 |
| 180.76.167.78 | attackspambots | k+ssh-bruteforce |
2020-08-07 22:42:45 |
| 96.45.182.124 | attack | 2020-08-07T13:53:45.429795ns386461 sshd\[27861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.182.124.16clouds.com user=root 2020-08-07T13:53:46.659854ns386461 sshd\[27861\]: Failed password for root from 96.45.182.124 port 54772 ssh2 2020-08-07T14:01:04.255311ns386461 sshd\[1728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.182.124.16clouds.com user=root 2020-08-07T14:01:06.094546ns386461 sshd\[1728\]: Failed password for root from 96.45.182.124 port 45756 ssh2 2020-08-07T14:05:57.450450ns386461 sshd\[6317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.182.124.16clouds.com user=root ... |
2020-08-07 22:58:19 |
| 213.166.73.17 | attack | [FriAug0714:05:59.9525562020][:error][pid5825:tid139903400621824][client213.166.73.17:43015][client213.166.73.17]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?i\)\(\?:\\\\\\\\x5c\|\(\?:%\(\?:2\(\?:5\(\?:2f\|5c\)\|F\|f\)\|c\(\?:0%\(\?:9v\|af\)\|1\)\|u\(\?:221[56]\|002f\)\|2\(\?:F\|F\)\|e0??\|1u\|5c\)\|\\\\\\\\/\)\)\(\?:%\(\?:2\(\?:\(\?:52\)\?e\|E\)\|\(\?:e0%8\|c\)0?\|u\(\?:002e\|2024\)\|2\(\?:E\|E\)\)\|\\\\\\\\.\){2}\(\?:\\\\\\\\x5c\|\(\?:%\(\?:2\(\?:5\(\?:2f\|5c\)\|F\|f\)\|c\(\?:0%\(\?:9v\|af\)\|1\)\|..."atARGS:file.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"198"][id"340007"][rev"47"][msg"Atomicorp.comWAFRules:GenericPathRecursiondenied"][data"/../\,ARGS:file"][severity"CRITICAL"][hostname"appalti-contratti.ch"][uri"/wp-content/plugins/db-backup/download.php"][unique_id"Xy1Dp8ORMJ9rBuORKRvdLAAAAMw"][FriAug0714:06:04.5502172020][:error][pid9433:tid139903400621824][client213.166.73.17:41231][client213.166.73.17]ModSecurity:Accessdeniedwithcode |
2020-08-07 22:45:01 |
| 159.89.50.148 | attackspam | 159.89.50.148 - - \[07/Aug/2020:15:20:42 +0200\] "POST /wp-login.php HTTP/1.0" 200 6462 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 159.89.50.148 - - \[07/Aug/2020:15:20:49 +0200\] "POST /wp-login.php HTTP/1.0" 200 6431 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 159.89.50.148 - - \[07/Aug/2020:15:20:55 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-08-07 23:01:46 |
| 191.8.92.24 | attackspam | Lines containing failures of 191.8.92.24 (max 1000) Aug 7 11:39:41 UTC__SANYALnet-Labs__cac12 sshd[15089]: Connection from 191.8.92.24 port 52582 on 64.137.176.96 port 22 Aug 7 11:39:43 UTC__SANYALnet-Labs__cac12 sshd[15089]: reveeclipse mapping checking getaddrinfo for 191-8-92-24.user.vivozap.com.br [191.8.92.24] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 7 11:39:43 UTC__SANYALnet-Labs__cac12 sshd[15089]: User r.r from 191.8.92.24 not allowed because not listed in AllowUsers Aug 7 11:39:43 UTC__SANYALnet-Labs__cac12 sshd[15089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.8.92.24 user=r.r Aug 7 11:39:45 UTC__SANYALnet-Labs__cac12 sshd[15089]: Failed password for invalid user r.r from 191.8.92.24 port 52582 ssh2 Aug 7 11:39:45 UTC__SANYALnet-Labs__cac12 sshd[15089]: Received disconnect from 191.8.92.24 port 52582:11: Bye Bye [preauth] Aug 7 11:39:45 UTC__SANYALnet-Labs__cac12 sshd[15089]: Disconnected from 191.8.92.24........ ------------------------------ |
2020-08-07 23:10:52 |