City: Pretoria
Region: Gauteng
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.29.244.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.29.244.193. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:53:39 CST 2025
;; MSG SIZE rcvd: 107
Host 193.244.29.196.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 193.244.29.196.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 1.54.133.10 | attack | May 3 10:43:01 sso sshd[7350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.54.133.10 May 3 10:43:03 sso sshd[7350]: Failed password for invalid user gandalf from 1.54.133.10 port 33564 ssh2 ... |
2020-05-03 18:44:34 |
| 65.49.20.66 | attackbots | SSH login attempts. |
2020-05-03 18:15:54 |
| 129.28.148.242 | attackbotsspam | May 3 03:32:14 ws26vmsma01 sshd[244665]: Failed password for root from 129.28.148.242 port 45172 ssh2 ... |
2020-05-03 18:35:24 |
| 5.101.0.209 | attackbots | [SunMay0312:10:50.9701532020][:error][pid19258:tid47899077674752][client5.101.0.209:43754][client5.101.0.209]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\^0\$"against"REQUEST_HEADERS:Content-Length"required.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"96"][id"392301"][rev"8"][msg"Atomicorp.comWAFRules:RequestContainingContent\,butMissingContent-Typeheader"][severity"NOTICE"][tag"no_ar"][hostname"148.251.104.79"][uri"/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php"][unique_id"Xq6Yqhme3rIDpUwZ@35MeQAAAFA"][SunMay0312:12:03.5030232020][:error][pid19258:tid47899058763520][client5.101.0.209:55222][client5.101.0.209]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\^0\$"against"REQUEST_HEADERS:Content-Length"required.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"96"][id"392301"][rev"8"][msg"Atomicorp.comWAFRules:RequestContainingContent\,butMissingContent-Typeheader"][severity"NOTICE"][tag"no_ar"][hos |
2020-05-03 18:14:27 |
| 80.211.89.9 | attackbotsspam | May 3 12:07:26 legacy sshd[20578]: Failed password for root from 80.211.89.9 port 48258 ssh2 May 3 12:11:16 legacy sshd[20684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.89.9 May 3 12:11:17 legacy sshd[20684]: Failed password for invalid user ark from 80.211.89.9 port 58852 ssh2 ... |
2020-05-03 18:23:10 |
| 101.71.129.8 | attackspam | May 2 23:04:20 server1 sshd\[14909\]: Invalid user tester from 101.71.129.8 May 2 23:04:20 server1 sshd\[14909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.129.8 May 2 23:04:22 server1 sshd\[14909\]: Failed password for invalid user tester from 101.71.129.8 port 7011 ssh2 May 2 23:08:27 server1 sshd\[16190\]: Invalid user florin from 101.71.129.8 May 2 23:08:27 server1 sshd\[16190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.129.8 ... |
2020-05-03 18:20:49 |
| 122.51.82.162 | attackbots | frenzy |
2020-05-03 18:48:20 |
| 104.26.4.97 | attackbotsspam | RUSSIAN SCAMMERS ! |
2020-05-03 18:33:05 |
| 52.66.178.222 | attackbotsspam | 52.66.178.222 - - [03/May/2020:08:37:45 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 52.66.178.222 - - [03/May/2020:08:37:46 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 52.66.178.222 - - [03/May/2020:08:37:47 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-05-03 18:07:59 |
| 93.190.58.4 | attackspam | Unauthorized access detected from black listed ip! |
2020-05-03 18:31:33 |
| 218.4.163.146 | attackbots | Invalid user ivr from 218.4.163.146 port 34938 |
2020-05-03 18:28:23 |
| 116.110.110.15 | attackbotsspam | May 3 05:48:29 prod4 vsftpd\[6743\]: \[anonymous\] FAIL LOGIN: Client "116.110.110.15" May 3 05:48:32 prod4 vsftpd\[6758\]: \[www\] FAIL LOGIN: Client "116.110.110.15" May 3 05:48:35 prod4 vsftpd\[6774\]: \[www\] FAIL LOGIN: Client "116.110.110.15" May 3 05:48:37 prod4 vsftpd\[6782\]: \[www\] FAIL LOGIN: Client "116.110.110.15" May 3 05:48:40 prod4 vsftpd\[6797\]: \[www\] FAIL LOGIN: Client "116.110.110.15" ... |
2020-05-03 18:42:11 |
| 159.89.46.73 | attackspam | [portscan] udp/1900 [ssdp] *(RWIN=-)(05031108) |
2020-05-03 18:17:54 |
| 185.255.131.119 | attackbotsspam | Unauthorised access (May 3) SRC=185.255.131.119 LEN=40 TTL=55 ID=53644 TCP DPT=8080 WINDOW=65320 SYN Unauthorised access (Apr 29) SRC=185.255.131.119 LEN=40 TOS=0x08 PREC=0x20 TTL=45 ID=33792 TCP DPT=8080 WINDOW=65320 SYN Unauthorised access (Apr 29) SRC=185.255.131.119 LEN=40 TOS=0x08 PREC=0x20 TTL=45 ID=47967 TCP DPT=8080 WINDOW=65320 SYN Unauthorised access (Apr 27) SRC=185.255.131.119 LEN=40 TOS=0x08 PREC=0x20 TTL=45 ID=50264 TCP DPT=8080 WINDOW=65320 SYN |
2020-05-03 18:34:19 |
| 194.152.206.103 | attack | Invalid user www from 194.152.206.103 port 33257 |
2020-05-03 18:47:15 |