City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.16.202.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;244.16.202.82. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 05:32:13 CST 2025
;; MSG SIZE rcvd: 106
Host 82.202.16.244.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 82.202.16.244.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
60.254.62.111 | attackspam | IN_APNIC-HM_<177>1582346599 [1:2403396:55517] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 49 [Classification: Misc Attack] [Priority: 2] {TCP} 60.254.62.111:43833 |
2020-02-22 20:21:59 |
36.73.34.61 | attackbots | [Sat Feb 22 11:42:25.919333 2020] [:error] [pid 26833:tid 140080430712576] [client 36.73.34.61:2484] [client 36.73.34.61] ModSecurity: Access denied with code 403 (phase 4). Pattern match "^5\\\\d{2}$" at RESPONSE_STATUS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/RESPONSE-950-DATA-LEAKAGES.conf"] [line "118"] [id "950100"] [msg "The Application Returned a 500-Level Status Code"] [data "Matched Data: 500 found within RESPONSE_STATUS: 500"] [severity "ERROR"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-disclosure"] [tag "WASCTC/WASC-13"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.6"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/component/tags/tag/analisis-distribusi-sifat-hujan-jawa-timur-bulanan"] [unique_id "XlCxMZMyxAVkTII4k5g1-QAAAAM"], referer: https://www.google.com/ ... |
2020-02-22 20:43:41 |
220.133.148.28 | normal | Normal IP |
2020-02-22 20:38:48 |
175.24.130.238 | attackbots | Feb 22 03:01:40 giraffe sshd[18391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.130.238 user=r.r Feb 22 03:01:42 giraffe sshd[18391]: Failed password for r.r from 175.24.130.238 port 60652 ssh2 Feb 22 03:01:42 giraffe sshd[18391]: Received disconnect from 175.24.130.238 port 60652:11: Bye Bye [preauth] Feb 22 03:01:42 giraffe sshd[18391]: Disconnected from 175.24.130.238 port 60652 [preauth] Feb 22 03:26:55 giraffe sshd[18717]: Invalid user test from 175.24.130.238 Feb 22 03:26:55 giraffe sshd[18717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.130.238 Feb 22 03:26:57 giraffe sshd[18717]: Failed password for invalid user test from 175.24.130.238 port 38278 ssh2 Feb 22 03:26:58 giraffe sshd[18717]: Received disconnect from 175.24.130.238 port 38278:11: Bye Bye [preauth] Feb 22 03:26:58 giraffe sshd[18717]: Disconnected from 175.24.130.238 port 38278 [preauth] Feb 22 03........ ------------------------------- |
2020-02-22 20:44:49 |
163.44.168.207 | attack | SSH/22 MH Probe, BF, Hack - |
2020-02-22 20:33:56 |
139.129.242.141 | attackspambots | frenzy |
2020-02-22 20:20:24 |
104.229.203.202 | attackspam | $f2bV_matches |
2020-02-22 20:06:27 |
184.167.32.172 | attack | Feb 22 10:31:21 ns382633 sshd\[21123\]: Invalid user mumble from 184.167.32.172 port 42632 Feb 22 10:31:21 ns382633 sshd\[21123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.167.32.172 Feb 22 10:31:22 ns382633 sshd\[21123\]: Failed password for invalid user mumble from 184.167.32.172 port 42632 ssh2 Feb 22 11:18:21 ns382633 sshd\[28630\]: Invalid user hduser from 184.167.32.172 port 34518 Feb 22 11:18:21 ns382633 sshd\[28630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.167.32.172 |
2020-02-22 20:23:03 |
85.132.100.24 | attack | Feb 22 12:58:15 nextcloud sshd\[30577\]: Invalid user info from 85.132.100.24 Feb 22 12:58:15 nextcloud sshd\[30577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.132.100.24 Feb 22 12:58:17 nextcloud sshd\[30577\]: Failed password for invalid user info from 85.132.100.24 port 52148 ssh2 |
2020-02-22 20:21:14 |
185.173.35.45 | attack | 02/22/2020-07:24:39.614808 185.173.35.45 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-22 20:29:37 |
134.209.9.244 | attackbots | 134.209.9.244:34508 - - [21/Feb/2020:19:27:25 +0100] "GET /wp-login.php HTTP/1.1" 404 297 |
2020-02-22 20:20:52 |
114.7.120.110 | attackspam | 20/2/21@23:43:53: FAIL: Alarm-Network address from=114.7.120.110 ... |
2020-02-22 20:08:46 |
120.132.30.27 | attackspambots | Feb 22 10:21:45 MK-Soft-Root2 sshd[9839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.30.27 Feb 22 10:21:47 MK-Soft-Root2 sshd[9839]: Failed password for invalid user reactweb from 120.132.30.27 port 43124 ssh2 ... |
2020-02-22 20:36:24 |
183.56.212.91 | attack | Invalid user chris from 183.56.212.91 port 50840 |
2020-02-22 20:26:55 |
106.13.53.70 | attackspambots | Feb 22 14:27:18 gw1 sshd[26645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.53.70 Feb 22 14:27:19 gw1 sshd[26645]: Failed password for invalid user kevin from 106.13.53.70 port 57122 ssh2 ... |
2020-02-22 20:46:00 |