City: unknown
Region: unknown
Country: Poland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.254.206.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56219
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.254.206.119. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 07:44:15 CST 2025
;; MSG SIZE rcvd: 108
Host 119.206.254.150.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 119.206.254.150.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.143.223.106 | attackbots | [2020-09-06 00:47:40] NOTICE[1194][C-00001191] chan_sip.c: Call from '' (45.143.223.106:64777) to extension '900441904911024' rejected because extension not found in context 'public'. [2020-09-06 00:47:40] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-06T00:47:40.089-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900441904911024",SessionID="0x7f2ddc1b7848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.223.106/64777",ACLName="no_extension_match" [2020-09-06 00:48:13] NOTICE[1194][C-00001192] chan_sip.c: Call from '' (45.143.223.106:50505) to extension '009441904911024' rejected because extension not found in context 'public'. [2020-09-06 00:48:13] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-06T00:48:13.737-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="009441904911024",SessionID="0x7f2ddc1b7848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U ... |
2020-09-06 13:04:37 |
| 45.64.126.103 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 25 - port: 21039 proto: tcp cat: Misc Attackbytes: 60 |
2020-09-06 13:35:47 |
| 187.85.29.54 | attackbotsspam |
|
2020-09-06 13:37:06 |
| 34.209.124.160 | attackspam | Lines containing failures of 34.209.124.160 auth.log:Sep 5 09:54:05 omfg sshd[14971]: Connection from 34.209.124.160 port 47182 on 78.46.60.42 port 22 auth.log:Sep 5 09:54:06 omfg sshd[14971]: Connection closed by 34.209.124.160 port 47182 [preauth] auth.log:Sep 5 09:54:07 omfg sshd[14973]: Connection from 34.209.124.160 port 48614 on 78.46.60.42 port 22 auth.log:Sep 5 09:54:07 omfg sshd[14973]: Unable to negotiate whostnameh 34.209.124.160 port 48614: no matching host key type found. Their offer: ecdsa-sha2-nistp384 [preauth] auth.log:Sep 5 09:54:08 omfg sshd[14975]: Connection from 34.209.124.160 port 49690 on 78.46.60.42 port 22 auth.log:Sep 5 09:54:09 omfg sshd[14975]: Unable to negotiate whostnameh 34.209.124.160 port 49690: no matching host key type found. Their offer: ecdsa-sha2-nistp521 [preauth] auth.log:Sep 5 09:54:10 omfg sshd[14977]: Connection from 34.209.124.160 port 50530 on 78.46.60.42 port 22 auth.log:Sep 5 09:54:11 omfg sshd[14977]: Connection c........ ------------------------------ |
2020-09-06 13:06:01 |
| 218.92.0.185 | attackbotsspam | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-06 12:57:20 |
| 66.240.192.138 | attack |
|
2020-09-06 13:16:29 |
| 162.158.159.140 | attack | srv02 Scanning Webserver Target(80:http) Events(1) .. |
2020-09-06 13:27:18 |
| 188.217.181.18 | attack | Invalid user xiewenjing from 188.217.181.18 port 37350 |
2020-09-06 13:25:17 |
| 14.160.52.58 | attackspambots | Attempted Brute Force (dovecot) |
2020-09-06 13:31:37 |
| 103.146.63.44 | attack | Sep 6 04:28:10 santamaria sshd\[14605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.63.44 user=root Sep 6 04:28:11 santamaria sshd\[14605\]: Failed password for root from 103.146.63.44 port 42644 ssh2 Sep 6 04:32:28 santamaria sshd\[14654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.63.44 user=root ... |
2020-09-06 13:32:33 |
| 193.169.255.40 | attackbots | Sep 6 05:16:36 localhost postfix/smtpd\[7688\]: warning: unknown\[193.169.255.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 6 05:16:42 localhost postfix/smtpd\[7688\]: warning: unknown\[193.169.255.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 6 05:16:52 localhost postfix/smtpd\[7688\]: warning: unknown\[193.169.255.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 6 05:17:15 localhost postfix/smtpd\[7688\]: warning: unknown\[193.169.255.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 6 05:17:21 localhost postfix/smtpd\[7688\]: warning: unknown\[193.169.255.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-06 13:07:16 |
| 207.244.252.113 | attackbots | (From superior@brainboost.com) From: HEADLINE NEWS August 2020 Bill Gates: "Americans Must Use This... I Never Leave Home Without Taking It First" That's Bill Gates talking about this breakthrough treatment for getting his brain back in top shape. He is not happy with where the country is headed and so he has poured money into a treatment that has rescued his mental clarity and it's doing the same accross the nation. Speaking on the TODAY Show last month, Bill Gates, Founder of Microsoft, spoke to the audience... "America is losing because of our own stupidity" We have got to change the way things are. You won't believe what Mr. Gates said he uses... " Full Story Inside > https://dclks.com/click.cgi?a=662x9a3059&o=72x335249&t=85x34d6a5&sub2=brain If you have a brain you must use this. See what the Sharks say... |
2020-09-06 13:14:16 |
| 61.177.172.168 | attack | Sep 6 07:24:01 plg sshd[12098]: Failed none for invalid user root from 61.177.172.168 port 52973 ssh2 Sep 6 07:24:01 plg sshd[12098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168 user=root Sep 6 07:24:03 plg sshd[12098]: Failed password for invalid user root from 61.177.172.168 port 52973 ssh2 Sep 6 07:24:07 plg sshd[12098]: Failed password for invalid user root from 61.177.172.168 port 52973 ssh2 Sep 6 07:24:11 plg sshd[12098]: Failed password for invalid user root from 61.177.172.168 port 52973 ssh2 Sep 6 07:24:14 plg sshd[12098]: Failed password for invalid user root from 61.177.172.168 port 52973 ssh2 Sep 6 07:24:19 plg sshd[12098]: Failed password for invalid user root from 61.177.172.168 port 52973 ssh2 Sep 6 07:24:19 plg sshd[12098]: error: maximum authentication attempts exceeded for invalid user root from 61.177.172.168 port 52973 ssh2 [preauth] ... |
2020-09-06 13:26:11 |
| 183.166.148.235 | attackbotsspam | Sep 5 20:37:06 srv01 postfix/smtpd\[10524\]: warning: unknown\[183.166.148.235\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 20:37:18 srv01 postfix/smtpd\[10524\]: warning: unknown\[183.166.148.235\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 20:37:34 srv01 postfix/smtpd\[10524\]: warning: unknown\[183.166.148.235\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 20:37:52 srv01 postfix/smtpd\[10524\]: warning: unknown\[183.166.148.235\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 20:38:04 srv01 postfix/smtpd\[10524\]: warning: unknown\[183.166.148.235\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-06 13:39:06 |
| 165.90.3.122 | attack | [Sun Sep 06 03:13:25.153543 2020] [:error] [pid 2754:tid 140397330274048] [client 165.90.3.122:65500] [client 165.90.3.122] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "972"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/POLICY/PROTOCOL_NOT_ALLOWED"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "X1PxZdlmuncnyx65RuMHlQAAAGU"]
... |
2020-09-06 13:06:58 |