City: Oakland
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.206.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.206.12. IN A
;; AUTHORITY SECTION:
. 444 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062100 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 21 16:57:36 CST 2022
;; MSG SIZE rcvd: 107
12.206.229.169.in-addr.arpa domain name pointer fixed-169-229-206-12.ocpa.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.206.229.169.in-addr.arpa name = fixed-169-229-206-12.ocpa.berkeley.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
41.142.234.25 | attack | Attempted WordPress login: "GET /wp-login.php" |
2020-08-14 08:04:17 |
221.2.35.78 | attackspam | Aug 13 22:38:28 vmd17057 sshd[23822]: Failed password for root from 221.2.35.78 port 5577 ssh2 ... |
2020-08-14 08:20:20 |
45.239.142.51 | attackspam | Attempted Brute Force (dovecot) |
2020-08-14 08:31:48 |
112.85.42.232 | attack | Aug 14 02:21:41 home sshd[3226059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232 user=root Aug 14 02:21:43 home sshd[3226059]: Failed password for root from 112.85.42.232 port 54267 ssh2 Aug 14 02:21:41 home sshd[3226059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232 user=root Aug 14 02:21:43 home sshd[3226059]: Failed password for root from 112.85.42.232 port 54267 ssh2 Aug 14 02:21:47 home sshd[3226059]: Failed password for root from 112.85.42.232 port 54267 ssh2 ... |
2020-08-14 08:28:13 |
185.176.221.160 | attackspam | Icarus honeypot on github |
2020-08-14 08:00:20 |
218.36.86.40 | attack | Aug 13 19:58:15 firewall sshd[10528]: Failed password for root from 218.36.86.40 port 50112 ssh2 Aug 13 20:02:56 firewall sshd[10638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.36.86.40 user=root Aug 13 20:02:58 firewall sshd[10638]: Failed password for root from 218.36.86.40 port 58742 ssh2 ... |
2020-08-14 08:29:16 |
144.217.12.194 | attackspambots | 2020-08-13T18:53:41.5516641495-001 sshd[44173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-144-217-12.net user=root 2020-08-13T18:53:43.6220191495-001 sshd[44173]: Failed password for root from 144.217.12.194 port 45570 ssh2 2020-08-13T19:02:04.4210101495-001 sshd[44613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-144-217-12.net user=root 2020-08-13T19:02:06.8774651495-001 sshd[44613]: Failed password for root from 144.217.12.194 port 43746 ssh2 2020-08-13T19:09:57.8780571495-001 sshd[44996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-144-217-12.net user=root 2020-08-13T19:09:59.9380531495-001 sshd[44996]: Failed password for root from 144.217.12.194 port 53222 ssh2 ... |
2020-08-14 07:54:16 |
167.172.50.28 | attackbots | Automatic report - Banned IP Access |
2020-08-14 08:17:42 |
112.241.121.115 | attackbotsspam | E-Mail Spam (RBL) [REJECTED] |
2020-08-14 08:12:58 |
141.144.61.39 | attackspambots | 2020-08-13T23:07:39.342726shield sshd\[17309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-141-144-61-39.compute.oraclecloud.com user=root 2020-08-13T23:07:41.425453shield sshd\[17309\]: Failed password for root from 141.144.61.39 port 50348 ssh2 2020-08-13T23:12:01.771441shield sshd\[17654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-141-144-61-39.compute.oraclecloud.com user=root 2020-08-13T23:12:03.483401shield sshd\[17654\]: Failed password for root from 141.144.61.39 port 39806 ssh2 2020-08-13T23:16:51.378099shield sshd\[18007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-141-144-61-39.compute.oraclecloud.com user=root |
2020-08-14 08:18:10 |
185.234.216.87 | attackspambots | Aug 14 00:40:25 srv01 postfix/smtpd\[31258\]: warning: unknown\[185.234.216.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 14 00:43:50 srv01 postfix/smtpd\[31780\]: warning: unknown\[185.234.216.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 14 00:53:38 srv01 postfix/smtpd\[31780\]: warning: unknown\[185.234.216.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 14 00:54:08 srv01 postfix/smtpd\[14298\]: warning: unknown\[185.234.216.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 14 00:55:12 srv01 postfix/smtpd\[14298\]: warning: unknown\[185.234.216.87\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-08-14 08:28:56 |
86.171.61.18 | attack | 2020-08-13T22:35:34.002334mail.broermann.family sshd[24598]: Failed password for root from 86.171.61.18 port 48752 ssh2 2020-08-13T22:39:08.514028mail.broermann.family sshd[24788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host86-171-61-18.range86-171.btcentralplus.com user=root 2020-08-13T22:39:10.595299mail.broermann.family sshd[24788]: Failed password for root from 86.171.61.18 port 58530 ssh2 2020-08-13T22:43:07.202840mail.broermann.family sshd[24935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host86-171-61-18.range86-171.btcentralplus.com user=root 2020-08-13T22:43:08.762284mail.broermann.family sshd[24935]: Failed password for root from 86.171.61.18 port 40076 ssh2 ... |
2020-08-14 08:03:38 |
201.91.86.28 | attackbotsspam | Aug 13 21:38:05 rocket sshd[31788]: Failed password for root from 201.91.86.28 port 29872 ssh2 Aug 13 21:42:54 rocket sshd[32647]: Failed password for root from 201.91.86.28 port 63223 ssh2 ... |
2020-08-14 08:15:19 |
189.68.49.79 | attack | srvr2: (mod_security) mod_security (id:920350) triggered by 189.68.49.79 (BR/-/189-68-49-79.dsl.telesp.net.br): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/13 22:42:55 [error] 67397#0: *166707 [client 189.68.49.79] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host' [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "159735137563.763188"] [ref "o0,16v21,16"], client: 189.68.49.79, [redacted] request: "GET / HTTP/1.1" [redacted] |
2020-08-14 08:10:39 |
101.32.28.88 | attackspam | Aug 14 01:31:16 ns382633 sshd\[11746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.28.88 user=root Aug 14 01:31:18 ns382633 sshd\[11746\]: Failed password for root from 101.32.28.88 port 36478 ssh2 Aug 14 01:37:54 ns382633 sshd\[12666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.28.88 user=root Aug 14 01:37:57 ns382633 sshd\[12666\]: Failed password for root from 101.32.28.88 port 48410 ssh2 Aug 14 01:44:25 ns382633 sshd\[13730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.28.88 user=root |
2020-08-14 08:24:20 |