City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.228.74.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.228.74.46. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 22:29:36 CST 2025
;; MSG SIZE rcvd: 105
46.74.228.18.in-addr.arpa domain name pointer ec2-18-228-74-46.sa-east-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
46.74.228.18.in-addr.arpa name = ec2-18-228-74-46.sa-east-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 173.252.87.43 | attack | [Sat Mar 21 10:50:02.596179 2020] [:error] [pid 8203:tid 140035788281600] [client 173.252.87.43:57758] [client 173.252.87.43] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/OneSignalSDKWorker.js"] [unique_id "XnWOweFFbXliLltByaHWpQAAAAE"], referer: https://karangploso.jatim.bmkg.go.id/OneSignalSDKWorker.js ... |
2020-03-21 16:49:41 |
| 35.194.160.189 | attackspam | Invalid user ftpuser from 35.194.160.189 port 56114 |
2020-03-21 16:45:22 |
| 60.220.54.89 | attackbots | firewall-block, port(s): 1433/tcp |
2020-03-21 16:47:45 |
| 198.98.52.141 | attackspam | Port 8080 (HTTP proxy) access denied |
2020-03-21 16:18:20 |
| 51.255.149.55 | attackspambots | <6 unauthorized SSH connections |
2020-03-21 16:17:35 |
| 106.13.188.247 | attackspambots | ssh brute force |
2020-03-21 15:59:34 |
| 113.184.157.201 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 21-03-2020 03:50:15. |
2020-03-21 16:36:26 |
| 218.107.49.71 | attack | (mod_security) mod_security (id:230011) triggered by 218.107.49.71 (CN/China/-): 5 in the last 3600 secs |
2020-03-21 16:46:56 |
| 197.33.111.45 | attack | firewall-block, port(s): 23/tcp |
2020-03-21 16:31:45 |
| 156.96.61.121 | attackbotsspam | firewall-block, port(s): 25/tcp |
2020-03-21 16:37:51 |
| 222.186.15.166 | attackbots | Mar 21 05:20:53 firewall sshd[2265]: Failed password for root from 222.186.15.166 port 26505 ssh2 Mar 21 05:20:55 firewall sshd[2265]: Failed password for root from 222.186.15.166 port 26505 ssh2 Mar 21 05:20:57 firewall sshd[2265]: Failed password for root from 222.186.15.166 port 26505 ssh2 ... |
2020-03-21 16:29:08 |
| 106.12.182.142 | attackbots | Mar 21 04:45:15 pornomens sshd\[30880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.182.142 user=uucp Mar 21 04:45:16 pornomens sshd\[30880\]: Failed password for uucp from 106.12.182.142 port 53494 ssh2 Mar 21 04:50:42 pornomens sshd\[30998\]: Invalid user delu from 106.12.182.142 port 34814 Mar 21 04:50:42 pornomens sshd\[30998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.182.142 ... |
2020-03-21 16:05:49 |
| 213.32.10.226 | attack | Invalid user reed from 213.32.10.226 port 39930 |
2020-03-21 16:17:50 |
| 185.176.27.166 | attack | Port 52710 scan denied |
2020-03-21 16:09:42 |
| 125.91.124.125 | attackspam | $f2bV_matches |
2020-03-21 16:00:17 |