City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.207.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.207.48. IN A
;; AUTHORITY SECTION:
. 543 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061302 1800 900 604800 86400
;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 14 07:01:09 CST 2022
;; MSG SIZE rcvd: 107
48.207.229.169.in-addr.arpa domain name pointer fixed-169-229-207-48.ets.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
48.207.229.169.in-addr.arpa name = fixed-169-229-207-48.ets.berkeley.edu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 200.89.159.190 | attackspambots | Sep 13 07:45:07 vm0 sshd[20375]: Failed password for root from 200.89.159.190 port 38880 ssh2 ... |
2020-09-13 19:19:55 |
| 20.36.194.79 | attack | srvr2: (mod_security) mod_security (id:934100) triggered by 20.36.194.79 (US/-/-): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/13 07:52:22 [error] 70302#0: *112258 [client 20.36.194.79] ModSecurity: Access denied with code 406 (phase 2). [file "/etc/modsecurity.d/REQUEST-934-APPLICATION-ATTACK-NODEJS.conf"] [line "48"] [id "934100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-javascript"] [tag "platform-multi"] [tag "attack-rce"] [tag "attack-injection-nodejs"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/242"] [redacted] [uri "/p/i/"] [unique_id "159997634234.076801"] [ref ""], client: 20.36.194.79, [redacted] request: "GET /p/i/?a=">&get=f_26&order=ASC&token=f1c6dd4b95196516b8a5cafed373733de1dafb9d HTTP/1.1" [redacted] |
2020-09-13 19:04:30 |
| 91.121.173.98 | attackbots | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-13 19:07:53 |
| 202.44.40.193 | attack | Brute-force attempt banned |
2020-09-13 18:43:35 |
| 61.12.67.133 | attackbotsspam | Sep 13 06:14:19 Tower sshd[21375]: Connection from 61.12.67.133 port 9387 on 192.168.10.220 port 22 rdomain "" Sep 13 06:14:21 Tower sshd[21375]: Failed password for root from 61.12.67.133 port 9387 ssh2 Sep 13 06:14:21 Tower sshd[21375]: Received disconnect from 61.12.67.133 port 9387:11: Bye Bye [preauth] Sep 13 06:14:21 Tower sshd[21375]: Disconnected from authenticating user root 61.12.67.133 port 9387 [preauth] |
2020-09-13 18:48:17 |
| 167.248.133.23 | attackspam | 222/tcp 445/tcp 5632/udp... [2020-09-01/13]85pkt,48pt.(tcp),6pt.(udp) |
2020-09-13 18:53:06 |
| 112.85.42.87 | attack | Sep 13 02:14:29 ip-172-31-42-142 sshd\[18184\]: Failed password for root from 112.85.42.87 port 30402 ssh2\ Sep 13 02:15:32 ip-172-31-42-142 sshd\[18200\]: Failed password for root from 112.85.42.87 port 14526 ssh2\ Sep 13 02:16:32 ip-172-31-42-142 sshd\[18202\]: Failed password for root from 112.85.42.87 port 46523 ssh2\ Sep 13 02:17:33 ip-172-31-42-142 sshd\[18231\]: Failed password for root from 112.85.42.87 port 26723 ssh2\ Sep 13 02:18:34 ip-172-31-42-142 sshd\[18235\]: Failed password for root from 112.85.42.87 port 64718 ssh2\ |
2020-09-13 18:53:46 |
| 185.245.41.4 | attackspambots | 2020-09-13T08:55:31.882926mail.standpoint.com.ua sshd[21187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.41.4 user=root 2020-09-13T08:55:33.325304mail.standpoint.com.ua sshd[21187]: Failed password for root from 185.245.41.4 port 46080 ssh2 2020-09-13T08:56:11.653473mail.standpoint.com.ua sshd[21282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.41.4 user=root 2020-09-13T08:56:14.255207mail.standpoint.com.ua sshd[21282]: Failed password for root from 185.245.41.4 port 55278 ssh2 2020-09-13T08:56:51.479208mail.standpoint.com.ua sshd[21365]: Invalid user gasa from 185.245.41.4 port 36250 ... |
2020-09-13 19:07:25 |
| 185.143.221.56 | attack | 2020-09-12 11:46:43.680988-0500 localhost screensharingd[64606]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 185.143.221.56 :: Type: VNC DES |
2020-09-13 19:05:11 |
| 153.122.84.229 | attackbots | $f2bV_matches |
2020-09-13 18:53:24 |
| 159.89.171.81 | attackspam | Failed password for invalid user test from 159.89.171.81 port 44874 ssh2 |
2020-09-13 19:19:34 |
| 152.136.106.94 | attackspam | Sep 13 06:22:09 ip106 sshd[7245]: Failed password for root from 152.136.106.94 port 55796 ssh2 ... |
2020-09-13 19:12:39 |
| 161.97.112.111 | attackspambots | 2020-09-12T13:13:17.086393bastadge sshd[8723]: Connection closed by invalid user root 161.97.112.111 port 56550 [preauth] ... |
2020-09-13 19:17:33 |
| 84.168.32.15 | attackbots | Scanning |
2020-09-13 18:44:32 |
| 129.227.129.174 | attackbotsspam | TCP ports : 902 / 3527 / 7199 / 8884; UDP ports : 3478 / 32767 |
2020-09-13 18:56:22 |