City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 154.6.195.174 | attackspam | Message ID |
2019-09-14 07:34:52 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.6.19.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58106
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;154.6.19.152. IN A
;; AUTHORITY SECTION:
. 384 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022093002 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 01 16:22:50 CST 2022
;; MSG SIZE rcvd: 105
Host 152.19.6.154.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 152.19.6.154.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.210.150.110 | attackspambots | 104.210.150.110 - - [23/Jun/2020:12:47:25 +0200] "GET /wp-login.php HTTP/1.1" 200 5738 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 104.210.150.110 - - [23/Jun/2020:12:47:28 +0200] "POST /wp-login.php HTTP/1.1" 200 5989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 104.210.150.110 - - [23/Jun/2020:12:47:29 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-23 19:23:58 |
| 66.249.79.231 | attack | [Tue Jun 23 10:50:00.713470 2020] [:error] [pid 13701:tid 140224517084928] [client 66.249.79.231:61604] [client 66.249.79.231] ModSecurity: Access denied with code 403 (phase 2). Pattern match "((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>]*?){6})" at ARGS:id. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "1526"] [id "942431"] [msg "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)"] [data "Matched Data: :kalender-tanam-katam-terpadu-kecamatan- found within ARGS:id: 1850:kalender-tanam-katam-terpadu-kecamatan-ngebel-kabupaten-ponorogo-tahun-2016-2018"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "OWAS
... |
2020-06-23 18:52:46 |
| 218.92.0.247 | attackspambots | Jun 23 12:42:20 santamaria sshd\[31039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.247 user=root Jun 23 12:42:21 santamaria sshd\[31039\]: Failed password for root from 218.92.0.247 port 53302 ssh2 Jun 23 12:42:25 santamaria sshd\[31039\]: Failed password for root from 218.92.0.247 port 53302 ssh2 ... |
2020-06-23 19:10:40 |
| 222.186.30.35 | attackspambots | 23.06.2020 11:09:06 SSH access blocked by firewall |
2020-06-23 19:19:19 |
| 199.249.230.111 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-06-23 19:21:42 |
| 142.93.101.30 | attackspam | Jun 23 10:44:43 game-panel sshd[3785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.30 Jun 23 10:44:46 game-panel sshd[3785]: Failed password for invalid user tester from 142.93.101.30 port 33190 ssh2 Jun 23 10:47:41 game-panel sshd[3970]: Failed password for root from 142.93.101.30 port 47772 ssh2 |
2020-06-23 18:52:06 |
| 35.229.84.55 | attack | Brute-force attempt banned |
2020-06-23 19:03:36 |
| 51.254.129.128 | attackspambots | 2020-06-23T11:41:55.944792amanda2.illicoweb.com sshd\[20268\]: Invalid user mysql from 51.254.129.128 port 41087 2020-06-23T11:41:55.949910amanda2.illicoweb.com sshd\[20268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-51-254-129.eu 2020-06-23T11:41:57.592119amanda2.illicoweb.com sshd\[20268\]: Failed password for invalid user mysql from 51.254.129.128 port 41087 ssh2 2020-06-23T11:51:39.992875amanda2.illicoweb.com sshd\[20800\]: Invalid user lucky from 51.254.129.128 port 44536 2020-06-23T11:51:39.995524amanda2.illicoweb.com sshd\[20800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-51-254-129.eu ... |
2020-06-23 19:15:25 |
| 112.85.42.89 | attackspam | Jun 23 12:54:20 ns381471 sshd[13480]: Failed password for root from 112.85.42.89 port 57037 ssh2 |
2020-06-23 19:06:37 |
| 43.239.152.194 | attackspambots | firewall-block, port(s): 80/tcp |
2020-06-23 18:51:29 |
| 92.154.18.142 | attackspam | Jun 23 01:50:16 vps46666688 sshd[12709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.154.18.142 Jun 23 01:50:19 vps46666688 sshd[12709]: Failed password for invalid user git from 92.154.18.142 port 44856 ssh2 ... |
2020-06-23 19:12:50 |
| 149.56.12.88 | attackspambots | Jun 23 12:43:30 home sshd[7497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.12.88 Jun 23 12:43:33 home sshd[7497]: Failed password for invalid user jupyter from 149.56.12.88 port 33324 ssh2 Jun 23 12:46:42 home sshd[7809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.12.88 ... |
2020-06-23 18:55:03 |
| 51.83.236.90 | attackbotsspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-06-23 19:07:30 |
| 23.129.64.208 | attack | Jun 23 10:47:27 mellenthin sshd[19685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.208 user=root Jun 23 10:47:29 mellenthin sshd[19685]: Failed password for invalid user root from 23.129.64.208 port 23983 ssh2 |
2020-06-23 19:21:16 |
| 141.98.81.42 | attackspam | flooding the internet |
2020-06-23 19:25:56 |