City: Tokyo
Region: Tokyo
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.104.49.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.104.49.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026011000 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 10 14:39:15 CST 2026
;; MSG SIZE rcvd: 106
Host 20.49.104.149.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 20.49.104.149.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.255.253.105 | attackspambots | [Mon Aug 24 16:11:08.217255 2020] [:error] [pid 26239:tid 140275657479936] [client 5.255.253.105:51726] [client 5.255.253.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "X0OELBdZ9muyTgqhHEybHQAAAe8"] ... |
2020-08-24 18:39:45 |
| 103.31.47.58 | attackspambots | *Port Scan* detected from 103.31.47.58 (ID/Indonesia/Jakarta/Kuningan Barat/srv2806.mugen.co.id). 4 hits in the last 205 seconds |
2020-08-24 18:33:41 |
| 193.95.247.90 | attackbots | Aug 24 00:00:12 Tower sshd[6372]: Connection from 193.95.247.90 port 43364 on 192.168.10.220 port 22 rdomain "" Aug 24 00:00:13 Tower sshd[6372]: Invalid user julie from 193.95.247.90 port 43364 Aug 24 00:00:13 Tower sshd[6372]: error: Could not get shadow information for NOUSER Aug 24 00:00:13 Tower sshd[6372]: Failed password for invalid user julie from 193.95.247.90 port 43364 ssh2 Aug 24 00:00:13 Tower sshd[6372]: Received disconnect from 193.95.247.90 port 43364:11: Bye Bye [preauth] Aug 24 00:00:13 Tower sshd[6372]: Disconnected from invalid user julie 193.95.247.90 port 43364 [preauth] |
2020-08-24 18:48:17 |
| 200.71.237.250 | attackbots | Icarus honeypot on github |
2020-08-24 18:24:13 |
| 124.152.118.131 | attackspam | $f2bV_matches |
2020-08-24 18:37:33 |
| 122.176.25.163 | attack | 20/8/23@23:50:41: FAIL: Alarm-Intrusion address from=122.176.25.163 ... |
2020-08-24 18:37:58 |
| 185.50.25.34 | attack | 185.50.25.34 - - [24/Aug/2020:07:19:19 +0100] "POST /wp-login.php HTTP/1.1" 200 2121 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 185.50.25.34 - - [24/Aug/2020:07:19:20 +0100] "POST /wp-login.php HTTP/1.1" 200 2116 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 185.50.25.34 - - [24/Aug/2020:07:19:22 +0100] "POST /wp-login.php HTTP/1.1" 200 2086 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-24 18:20:55 |
| 198.245.53.163 | attack | 2020-08-24T04:02:05.509068linuxbox-skyline sshd[110071]: Invalid user seongmin from 198.245.53.163 port 56590 ... |
2020-08-24 18:04:24 |
| 216.218.206.66 | attackspambots | 1598264349 - 08/24/2020 12:19:09 Host: 216.218.206.66/216.218.206.66 Port: 8080 TCP Blocked |
2020-08-24 18:22:57 |
| 185.220.102.250 | attack | Fail2Ban |
2020-08-24 18:20:02 |
| 194.170.156.9 | attackbotsspam | 2020-08-24T10:18:33.364347abusebot.cloudsearch.cf sshd[11293]: Invalid user ajc from 194.170.156.9 port 32912 2020-08-24T10:18:33.369515abusebot.cloudsearch.cf sshd[11293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9 2020-08-24T10:18:33.364347abusebot.cloudsearch.cf sshd[11293]: Invalid user ajc from 194.170.156.9 port 32912 2020-08-24T10:18:35.102063abusebot.cloudsearch.cf sshd[11293]: Failed password for invalid user ajc from 194.170.156.9 port 32912 ssh2 2020-08-24T10:22:15.155313abusebot.cloudsearch.cf sshd[11412]: Invalid user odoo from 194.170.156.9 port 58123 2020-08-24T10:22:15.161596abusebot.cloudsearch.cf sshd[11412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9 2020-08-24T10:22:15.155313abusebot.cloudsearch.cf sshd[11412]: Invalid user odoo from 194.170.156.9 port 58123 2020-08-24T10:22:16.703539abusebot.cloudsearch.cf sshd[11412]: Failed password for invalid us ... |
2020-08-24 18:44:29 |
| 198.245.50.81 | attack | Aug 24 11:46:45 ns382633 sshd\[8361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81 user=root Aug 24 11:46:46 ns382633 sshd\[8361\]: Failed password for root from 198.245.50.81 port 58760 ssh2 Aug 24 11:48:16 ns382633 sshd\[8543\]: Invalid user ralph from 198.245.50.81 port 49470 Aug 24 11:48:16 ns382633 sshd\[8543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81 Aug 24 11:48:17 ns382633 sshd\[8543\]: Failed password for invalid user ralph from 198.245.50.81 port 49470 ssh2 |
2020-08-24 18:04:39 |
| 91.121.93.21 | attackspam | 2020-08-24T13:02:20.588328mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2 2020-08-24T13:02:22.468939mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2 2020-08-24T13:02:24.640051mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2 2020-08-24T13:02:26.737641mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2 2020-08-24T13:02:28.443332mail.standpoint.com.ua sshd[28952]: Failed password for storage from 91.121.93.21 port 60883 ssh2 ... |
2020-08-24 18:39:16 |
| 84.39.188.170 | attack | SSH Scan |
2020-08-24 18:27:12 |
| 193.243.165.142 | attackbotsspam | Aug 24 00:47:58 mockhub sshd[9791]: Failed password for root from 193.243.165.142 port 47667 ssh2 Aug 24 00:51:41 mockhub sshd[9919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.243.165.142 ... |
2020-08-24 18:50:39 |