City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.208.245.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.208.245.34. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:40:06 CST 2025
;; MSG SIZE rcvd: 106
34.245.208.18.in-addr.arpa domain name pointer ec2-18-208-245-34.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.245.208.18.in-addr.arpa name = ec2-18-208-245-34.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.13.85.77 | attackbots | Automatic report - SSH Brute-Force Attack |
2020-02-12 10:56:42 |
| 66.220.149.36 | attackspambots | [Wed Feb 12 05:23:57.874345 2020] [:error] [pid 17174:tid 140476426479360] [client 66.220.149.36:50900] [client 66.220.149.36] ModSecurity: Access denied with code 403 (phase 4). Pattern match "^5\\\\d{2}$" at RESPONSE_STATUS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/RESPONSE-950-DATA-LEAKAGES.conf"] [line "118"] [id "950100"] [msg "The Application Returned a 500-Level Status Code"] [data "Matched Data: 500 found within RESPONSE_STATUS: 500"] [severity "ERROR"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-disclosure"] [tag "WASCTC/WASC-13"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.6"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/profil/meteorologi/list-all-categories/555557850-prakiraan-cuaca-harian-tiap-3-jam-sekali-di-kabupaten-malang"] [unique_id "XkMpfcX5geykIQSsu003vQAAAHE"]
... |
2020-02-12 11:00:22 |
| 36.74.75.31 | attackspambots | Feb 12 02:18:06 ns382633 sshd\[8975\]: Invalid user ryan from 36.74.75.31 port 34412 Feb 12 02:18:06 ns382633 sshd\[8975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.74.75.31 Feb 12 02:18:08 ns382633 sshd\[8975\]: Failed password for invalid user ryan from 36.74.75.31 port 34412 ssh2 Feb 12 02:44:49 ns382633 sshd\[13172\]: Invalid user matt from 36.74.75.31 port 45861 Feb 12 02:44:49 ns382633 sshd\[13172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.74.75.31 |
2020-02-12 10:37:36 |
| 106.241.16.105 | attackspam | ... |
2020-02-12 10:29:49 |
| 122.51.162.201 | attackbotsspam | Feb 12 03:04:49 vmd17057 sshd\[25491\]: Invalid user qiao from 122.51.162.201 port 48008 Feb 12 03:04:49 vmd17057 sshd\[25491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.162.201 Feb 12 03:04:51 vmd17057 sshd\[25491\]: Failed password for invalid user qiao from 122.51.162.201 port 48008 ssh2 ... |
2020-02-12 10:47:53 |
| 172.98.86.80 | attack | TCP Port Scanning |
2020-02-12 11:08:05 |
| 45.5.57.184 | attackbotsspam | Feb 11 23:27:49 firewall sshd[16952]: Invalid user roger from 45.5.57.184 Feb 11 23:27:51 firewall sshd[16952]: Failed password for invalid user roger from 45.5.57.184 port 52340 ssh2 Feb 11 23:28:17 firewall sshd[16987]: Invalid user michael from 45.5.57.184 ... |
2020-02-12 11:09:16 |
| 111.1.62.189 | attackspam | CN_APNIC-HM_<177>1581459874 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 111.1.62.189:40061 |
2020-02-12 10:31:47 |
| 177.139.121.27 | attackbotsspam | 2020-02-11T15:49:27.7868911495-001 sshd[7289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.121.27 user=r.r 2020-02-11T15:49:30.2501691495-001 sshd[7289]: Failed password for r.r from 177.139.121.27 port 51069 ssh2 2020-02-11T15:55:27.0570871495-001 sshd[7608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.121.27 user=r.r 2020-02-11T15:55:29.2745591495-001 sshd[7608]: Failed password for r.r from 177.139.121.27 port 41253 ssh2 2020-02-11T15:58:27.5076071495-001 sshd[7872]: Invalid user nirvana from 177.139.121.27 port 53372 2020-02-11T15:58:27.5107301495-001 sshd[7872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.121.27 2020-02-11T15:58:27.5076071495-001 sshd[7872]: Invalid user nirvana from 177.139.121.27 port 53372 2020-02-11T15:58:29.1058041495-001 sshd[7872]: Failed password for invalid user nirvana from 177.139.12........ ------------------------------ |
2020-02-12 10:42:04 |
| 185.175.93.14 | attack | 02/11/2020-21:18:06.094652 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-12 10:21:06 |
| 142.93.130.58 | attackbots | Feb 12 01:26:16 MK-Soft-VM8 sshd[21476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.130.58 Feb 12 01:26:19 MK-Soft-VM8 sshd[21476]: Failed password for invalid user applsyspub from 142.93.130.58 port 35258 ssh2 ... |
2020-02-12 10:22:14 |
| 159.65.157.194 | attackbotsspam | Feb 11 14:42:02 sachi sshd\[27876\]: Invalid user olli from 159.65.157.194 Feb 11 14:42:02 sachi sshd\[27876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.157.194 Feb 11 14:42:04 sachi sshd\[27876\]: Failed password for invalid user olli from 159.65.157.194 port 46146 ssh2 Feb 11 14:44:43 sachi sshd\[28148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.157.194 user=root Feb 11 14:44:45 sachi sshd\[28148\]: Failed password for root from 159.65.157.194 port 39578 ssh2 |
2020-02-12 10:26:52 |
| 126.36.21.62 | attackbotsspam | TCP Port Scanning |
2020-02-12 10:19:36 |
| 78.195.178.119 | attack | Feb 11 22:12:23 firewall sshd[13599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.195.178.119 Feb 11 22:12:23 firewall sshd[13599]: Invalid user pi from 78.195.178.119 Feb 11 22:12:25 firewall sshd[13599]: Failed password for invalid user pi from 78.195.178.119 port 40362 ssh2 ... |
2020-02-12 10:15:42 |
| 35.194.69.197 | attackspam | Feb 12 01:23:00 silence02 sshd[5706]: Failed password for root from 35.194.69.197 port 44590 ssh2 Feb 12 01:26:04 silence02 sshd[5988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.194.69.197 Feb 12 01:26:07 silence02 sshd[5988]: Failed password for invalid user hhlim from 35.194.69.197 port 46090 ssh2 |
2020-02-12 10:52:25 |