City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.75.40.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;146.75.40.19. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 18:19:03 CST 2025
;; MSG SIZE rcvd: 105
Host 19.40.75.146.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 19.40.75.146.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 182.1.98.0 | attackspam | [Wed Aug 12 10:49:45.245828 2020] [:error] [pid 15638:tid 140440163542784] [client 182.1.98.0:35895] [client 182.1.98.0] ModSecurity: Access denied with code 403 (phase 4). Pattern match "^5\\\\d{2}$" at RESPONSE_STATUS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/RESPONSE-950-DATA-LEAKAGES.conf"] [line "118"] [id "950100"] [msg "The Application Returned a 500-Level Status Code"] [data "Matched Data: 500 found within RESPONSE_STATUS: 500"] [severity "ERROR"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-disclosure"] [tag "WASCTC/WASC-13"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.6"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/profil/meteorologi/prakiraan-meteorologi/568-prakiraan-cuaca-jember"] [unique_id "XzNm2TndH8uMZ0EJHtbAmgAB8QI"], referer: https://www.google.com/
... |
2020-08-12 16:52:54 |
| 91.121.45.5 | attackspambots | sshd: Failed password for .... from 91.121.45.5 port 52289 ssh2 (8 attempts) |
2020-08-12 17:06:44 |
| 134.175.129.58 | attackspam | Aug 12 11:09:53 fhem-rasp sshd[18399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.129.58 user=root Aug 12 11:09:55 fhem-rasp sshd[18399]: Failed password for root from 134.175.129.58 port 47144 ssh2 ... |
2020-08-12 17:10:57 |
| 86.105.217.13 | attack | Aug 12 08:31:23 vpn01 sshd[24315]: Failed password for root from 86.105.217.13 port 46516 ssh2 ... |
2020-08-12 17:03:12 |
| 46.101.204.40 | attack | Aug 12 10:39:14 root sshd[7223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.40 user=root Aug 12 10:39:17 root sshd[7223]: Failed password for root from 46.101.204.40 port 35222 ssh2 ... |
2020-08-12 17:07:11 |
| 51.39.196.2 | attackspambots | Automatic report - Port Scan Attack |
2020-08-12 16:49:49 |
| 134.175.161.251 | attackbotsspam | Aug 12 01:46:49 propaganda sshd[36224]: Connection from 134.175.161.251 port 54064 on 10.0.0.160 port 22 rdomain "" Aug 12 01:46:50 propaganda sshd[36224]: Connection closed by 134.175.161.251 port 54064 [preauth] |
2020-08-12 16:55:35 |
| 222.186.175.183 | attack | Aug 12 10:45:52 theomazars sshd[24719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Aug 12 10:45:54 theomazars sshd[24719]: Failed password for root from 222.186.175.183 port 41120 ssh2 |
2020-08-12 16:50:09 |
| 45.143.222.196 | attack | [f2b] sshd bruteforce, retries: 1 |
2020-08-12 17:09:09 |
| 188.166.159.127 | attack | Brute-force attempt banned |
2020-08-12 16:54:59 |
| 209.17.96.98 | attackbots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-12 16:49:19 |
| 156.96.156.138 | attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 12 - port: 443 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-12 16:46:49 |
| 145.239.252.226 | attackspam | Aug 12 08:57:41 abendstille sshd\[4301\]: Invalid user admin from 145.239.252.226 Aug 12 08:57:41 abendstille sshd\[4301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.252.226 Aug 12 08:57:42 abendstille sshd\[4301\]: Failed password for invalid user admin from 145.239.252.226 port 46034 ssh2 Aug 12 08:57:43 abendstille sshd\[4367\]: Invalid user admin from 145.239.252.226 Aug 12 08:57:44 abendstille sshd\[4367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.252.226 ... |
2020-08-12 18:01:22 |
| 123.125.21.125 | attackbots | Aug 12 08:36:56 vps-51d81928 sshd[592722]: Failed password for root from 123.125.21.125 port 57608 ssh2 Aug 12 08:37:29 vps-51d81928 sshd[592732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.125.21.125 user=root Aug 12 08:37:31 vps-51d81928 sshd[592732]: Failed password for root from 123.125.21.125 port 33904 ssh2 Aug 12 08:38:00 vps-51d81928 sshd[592738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.125.21.125 user=root Aug 12 08:38:03 vps-51d81928 sshd[592738]: Failed password for root from 123.125.21.125 port 38430 ssh2 ... |
2020-08-12 16:48:56 |
| 46.237.38.151 | attack |
|
2020-08-12 17:01:32 |