City: unknown
Region: unknown
Country: Netherlands (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.114.3.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.114.3.34. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:39:47 CST 2025
;; MSG SIZE rcvd: 105
34.3.114.145.in-addr.arpa domain name pointer SURFnet-NL.IPv4.PTR.145.114.x.INVALID.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.3.114.145.in-addr.arpa name = SURFnet-NL.IPv4.PTR.145.114.x.INVALID.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.249.235.237 | attackspam | Unauthorized connection attempt detected from IP address 222.249.235.237 to port 2220 [J] |
2020-02-05 02:02:52 |
| 134.73.7.237 | attackspambots | 2019-05-04 22:25:07 1hN1DX-0001fn-Fg SMTP connection from sour.sandyfadadu.com \(sour.goyalpublishers.icu\) \[134.73.7.237\]:47928 I=\[193.107.90.29\]:25 closed by DROP in ACL 2019-05-04 22:27:27 1hN1Fn-0001i4-7y SMTP connection from sour.sandyfadadu.com \(sour.goyalpublishers.icu\) \[134.73.7.237\]:52960 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-05-04 22:27:45 1hN1G5-0001iL-Bl SMTP connection from sour.sandyfadadu.com \(sour.goyalpublishers.icu\) \[134.73.7.237\]:38797 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 01:59:36 |
| 137.63.129.2 | attack | 2019-03-11 18:23:27 H=\(\[137.63.129.2\]\) \[137.63.129.2\]:16736 I=\[193.107.88.166\]:25 F=\ |
2020-02-05 01:23:39 |
| 123.133.112.42 | attack | Feb 4 18:44:06 v22018076622670303 sshd\[21855\]: Invalid user postgres from 123.133.112.42 port 44160 Feb 4 18:44:06 v22018076622670303 sshd\[21855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.133.112.42 Feb 4 18:44:08 v22018076622670303 sshd\[21855\]: Failed password for invalid user postgres from 123.133.112.42 port 44160 ssh2 ... |
2020-02-05 01:53:15 |
| 134.73.7.249 | attackbotsspam | 2019-05-06 12:22:14 1hNalB-0004Ag-QJ SMTP connection from vivacious.sandyfadadu.com \(vivacious.yifysubs.icu\) \[134.73.7.249\]:51488 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-05-06 12:24:00 1hNamu-0004Eb-LC SMTP connection from vivacious.sandyfadadu.com \(vivacious.yifysubs.icu\) \[134.73.7.249\]:38798 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-05-06 12:24:07 1hNan0-0004Em-Rs SMTP connection from vivacious.sandyfadadu.com \(vivacious.yifysubs.icu\) \[134.73.7.249\]:43615 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 01:43:44 |
| 222.186.42.136 | attackspambots | Feb 4 18:19:38 legacy sshd[30518]: Failed password for root from 222.186.42.136 port 22931 ssh2 Feb 4 18:19:39 legacy sshd[30518]: Failed password for root from 222.186.42.136 port 22931 ssh2 Feb 4 18:19:42 legacy sshd[30518]: Failed password for root from 222.186.42.136 port 22931 ssh2 ... |
2020-02-05 01:26:02 |
| 138.219.218.136 | attack | 2019-03-11 15:55:14 H=\(\[138.219.218.136\]\) \[138.219.218.136\]:32756 I=\[193.107.88.166\]:25 F=\ |
2020-02-05 01:18:20 |
| 134.73.7.245 | attackspam | 2019-04-26 00:19:34 1hJmiL-0002rg-Uz SMTP connection from doubtful.sandyfadadu.com \(doubtful.healthypowerin.icu\) \[134.73.7.245\]:36416 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-04-26 00:21:23 1hJmk6-0002vT-VL SMTP connection from doubtful.sandyfadadu.com \(doubtful.healthypowerin.icu\) \[134.73.7.245\]:57355 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-04-26 00:22:10 1hJmks-0002wk-EP SMTP connection from doubtful.sandyfadadu.com \(doubtful.healthypowerin.icu\) \[134.73.7.245\]:44670 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 01:51:35 |
| 103.89.252.123 | attack | $f2bV_matches |
2020-02-05 01:48:46 |
| 183.20.159.107 | attackbotsspam | Feb 4 17:18:41 serwer sshd\[8636\]: Invalid user pi from 183.20.159.107 port 60414 Feb 4 17:18:41 serwer sshd\[8636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.20.159.107 Feb 4 17:18:43 serwer sshd\[8636\]: Failed password for invalid user pi from 183.20.159.107 port 60414 ssh2 ... |
2020-02-05 01:45:24 |
| 18.184.155.204 | attackbots | WordPress login Brute force / Web App Attack on client site. |
2020-02-05 01:53:50 |
| 45.184.24.5 | attack | Feb 4 14:38:29 ns382633 sshd\[28859\]: Invalid user sales from 45.184.24.5 port 44268 Feb 4 14:38:29 ns382633 sshd\[28859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.24.5 Feb 4 14:38:30 ns382633 sshd\[28859\]: Failed password for invalid user sales from 45.184.24.5 port 44268 ssh2 Feb 4 14:49:57 ns382633 sshd\[30773\]: Invalid user sales from 45.184.24.5 port 52310 Feb 4 14:49:57 ns382633 sshd\[30773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.24.5 |
2020-02-05 01:56:33 |
| 80.150.95.170 | attackspambots | Feb 4 12:29:55 plusreed sshd[6206]: Invalid user gogs from 80.150.95.170 ... |
2020-02-05 01:36:20 |
| 218.92.0.171 | attack | 2020-02-04T17:49:39.958150homeassistant sshd[29587]: Failed none for root from 218.92.0.171 port 43976 ssh2 2020-02-04T17:49:40.188791homeassistant sshd[29587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171 user=root ... |
2020-02-05 01:49:57 |
| 66.220.149.15 | attackspambots | [Tue Feb 04 20:50:11.983466 2020] [:error] [pid 2034:tid 140558491895552] [client 66.220.149.15:40430] [client 66.220.149.15] ModSecurity: Access denied with code 403 (phase 2). Found 3 byte(s) in REQUEST_URI outside range: 32-36,38-126. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "1304"] [id "920272"] [msg "Invalid character in request (outside of printable chars below ascii 127)"] [data "REQUEST_URI=/images/Klimatologi/Analisis/02-Analisis_Dasarian/Dinamika/2020/01_Januari_2020/Das-III/Analisis_Dinamika_Atmosfer\\xe2\\x80\\x93Laut_Dan_Prediksi_Curah_Hujan_Update_Dasarian_III_Januari_2020.jpg"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/EVASION"] [tag "paranoia-level/3"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/images/Klimatologi/Analisis/02-Analisis_Dasarian/Dinamika/ ... |
2020-02-05 01:39:46 |