City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.182.78.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.182.78.42. IN A
;; AUTHORITY SECTION:
. 504 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2021122900 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 21:14:27 CST 2021
;; MSG SIZE rcvd: 106
Host 42.78.182.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.78.182.242.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.233.159.65 | attack | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-05-10 15:51:20 |
| 111.93.200.50 | attackspam | <6 unauthorized SSH connections |
2020-05-10 15:48:07 |
| 104.131.71.105 | attack | ssh brute force |
2020-05-10 15:37:32 |
| 125.124.180.71 | attack | May 10 05:56:55 vps333114 sshd[7451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.180.71 May 10 05:56:57 vps333114 sshd[7451]: Failed password for invalid user password123 from 125.124.180.71 port 59276 ssh2 ... |
2020-05-10 15:29:17 |
| 148.70.125.42 | attackbots | May 10 02:10:58 NPSTNNYC01T sshd[2423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.125.42 May 10 02:11:00 NPSTNNYC01T sshd[2423]: Failed password for invalid user admin from 148.70.125.42 port 34944 ssh2 May 10 02:15:22 NPSTNNYC01T sshd[2905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.125.42 ... |
2020-05-10 15:08:44 |
| 114.67.83.42 | attackspambots | May 10 07:58:05 server sshd[30013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.83.42 May 10 07:58:07 server sshd[30013]: Failed password for invalid user info from 114.67.83.42 port 42778 ssh2 May 10 08:03:24 server sshd[31277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.83.42 ... |
2020-05-10 15:23:32 |
| 46.38.144.202 | attack | May 10 09:29:45 v22019058497090703 postfix/smtpd[28052]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 10 09:30:21 v22019058497090703 postfix/smtpd[28052]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 10 09:30:57 v22019058497090703 postfix/smtpd[28052]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-10 15:34:05 |
| 51.116.179.7 | attack | May 10 13:18:46 webhost01 sshd[32357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.116.179.7 May 10 13:18:48 webhost01 sshd[32357]: Failed password for invalid user mc3 from 51.116.179.7 port 36082 ssh2 ... |
2020-05-10 15:09:11 |
| 118.25.79.56 | attackspam | May 10 07:53:30 legacy sshd[8023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.79.56 May 10 07:53:32 legacy sshd[8023]: Failed password for invalid user ubuntu from 118.25.79.56 port 33462 ssh2 May 10 07:57:42 legacy sshd[8192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.79.56 ... |
2020-05-10 15:16:40 |
| 49.72.111.139 | attackspambots | May 10 09:06:06 mellenthin sshd[21251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.111.139 May 10 09:06:09 mellenthin sshd[21251]: Failed password for invalid user nagios1 from 49.72.111.139 port 59298 ssh2 |
2020-05-10 15:33:44 |
| 103.138.108.156 | attack | May 10 08:35:46 debian-2gb-nbg1-2 kernel: \[11351419.255438\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.138.108.156 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=34378 PROTO=TCP SPT=46216 DPT=3261 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-10 15:13:41 |
| 185.220.101.8 | attackbotsspam | [Sun May 10 10:51:50.315643 2020] [:error] [pid 27913:tid 140543073974016] [client 185.220.101.8:7658] [client 185.220.101.8] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "1224"] [id "920320"] [msg "Missing User Agent Header"] [severity "NOTICE"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/MISSING_HEADER_UA"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/depan/kunjungan/1.jpg"] [unique_id "Xrd6VjafVEB75Fl-reoByQAAAC0"] ... |
2020-05-10 15:51:52 |
| 222.186.52.86 | attackspambots | May 10 10:19:29 www2 sshd\[40168\]: Failed password for root from 222.186.52.86 port 52818 ssh2May 10 10:20:41 www2 sshd\[40464\]: Failed password for root from 222.186.52.86 port 21498 ssh2May 10 10:20:44 www2 sshd\[40464\]: Failed password for root from 222.186.52.86 port 21498 ssh2 ... |
2020-05-10 15:23:01 |
| 23.29.122.194 | attackspambots | xmlrpc attack |
2020-05-10 15:49:44 |
| 111.252.28.93 | attackbotsspam | Unauthorised access (May 10) SRC=111.252.28.93 LEN=52 TTL=109 ID=11559 DF TCP DPT=445 WINDOW=8192 SYN |
2020-05-10 15:27:45 |