City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.141.161.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;245.141.161.2. IN A
;; AUTHORITY SECTION:
. 521 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022121401 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 15 12:52:36 CST 2022
;; MSG SIZE rcvd: 106
Host 2.161.141.245.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 2.161.141.245.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 150.109.193.247 | attackspam | Port Scan/VNC login attempt ... |
2020-09-09 02:47:59 |
| 114.104.130.57 | attackspam | Lines containing failures of 114.104.130.57 (max 1000) Sep 7 16:09:04 nexus sshd[14633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.104.130.57 user=r.r Sep 7 16:09:06 nexus sshd[14633]: Failed password for r.r from 114.104.130.57 port 50502 ssh2 Sep 7 16:09:07 nexus sshd[14633]: Received disconnect from 114.104.130.57 port 50502:11: Bye Bye [preauth] Sep 7 16:09:07 nexus sshd[14633]: Disconnected from 114.104.130.57 port 50502 [preauth] Sep 7 16:21:17 nexus sshd[14696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.104.130.57 user=r.r Sep 7 16:21:19 nexus sshd[14696]: Failed password for r.r from 114.104.130.57 port 38177 ssh2 Sep 7 16:21:19 nexus sshd[14696]: Received disconnect from 114.104.130.57 port 38177:11: Bye Bye [preauth] Sep 7 16:21:19 nexus sshd[14696]: Disconnected from 114.104.130.57 port 38177 [preauth] Sep 7 16:26:26 nexus sshd[14898]: pam_unix(sshd:a........ ------------------------------ |
2020-09-09 02:53:01 |
| 151.28.220.28 | attackspambots | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: ppp-28-220.28-151.wind.it. |
2020-09-09 03:20:26 |
| 59.126.28.107 | attackbotsspam | Portscan detected |
2020-09-09 03:17:21 |
| 37.59.47.61 | attackbots | (cxs) cxs mod_security triggered by 37.59.47.61 (FR/France/ns3000828.ip-37-59-47.eu): 1 in the last 3600 secs (CF_ENABLE); Ports: *; Direction: inout; Trigger: LF_CXS; Logs: [Tue Sep 08 20:09:11.063353 2020] [:error] [pid 2555618:tid 47466686805760] [client 37.59.47.61:61609] [client 37.59.47.61] ModSecurity: Access denied with code 403 (phase 2). File "/tmp/20200908-200909-X1fIxRXGPD0CMJAoChHCpAAAAQA-file-Ujn7XG" rejected by the approver script "/etc/cxs/cxscgi.sh": 0 [file "/etc/apache2/conf.d/modsec_vendor_configs/configserver/00_configserver.conf"] [line "7"] [id "1010101"] [msg "ConfigServer Exploit Scanner (cxs) triggered"] [severity "CRITICAL"] [hostname "teknasmuceh.si"] [uri "/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php"] [unique_id "X1fIxRXGPD0CMJAoChHCpAAAAQA"] |
2020-09-09 03:04:28 |
| 104.144.155.167 | attackspam | (From edmundse13@gmail.com) Hello there! I was browsing on your website and it got me wondering if you're looking for cheap but high-quality web design services. I'm a web designer working from home and have more than a decade of experience in the field. I'm capable of developing a stunning and highly profitable website that will surpass your competitors. I'm very proficient in WordPress and other web platforms and shopping carts. If you're not familiar with them, I'd like an opportunity to show you how easy it is to develop your site on that platform giving you an incredible number of features. In addition to features that make doing business easier on your website, I can also include some elements that your site needs to make it more user-friendly and profitable. I'm offering you a free consultation so that I can explain what design solutions best fit your needs, the rates, and what you can expect to get in return. If you're interested, kindly write back with your contact details and a time that be |
2020-09-09 02:59:59 |
| 51.222.14.28 | attack | SSH brute force |
2020-09-09 03:03:30 |
| 103.95.25.22 | attackspam | Sep 7 17:48:06 ms-srv sshd[33936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.95.25.22 user=root Sep 7 17:48:08 ms-srv sshd[33936]: Failed password for invalid user root from 103.95.25.22 port 31251 ssh2 |
2020-09-09 02:48:51 |
| 45.61.136.146 | attackspam |
|
2020-09-09 03:16:18 |
| 123.206.23.106 | attackbotsspam | Jul 9 13:55:55 server sshd[3438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.23.106 Jul 9 13:55:57 server sshd[3438]: Failed password for invalid user je from 123.206.23.106 port 33790 ssh2 Jul 9 14:05:16 server sshd[4235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.23.106 Jul 9 14:05:18 server sshd[4235]: Failed password for invalid user user from 123.206.23.106 port 42694 ssh2 |
2020-09-09 03:14:06 |
| 51.79.74.209 | attack | Failed password for invalid user ncmdbuser from 51.79.74.209 port 52728 ssh2 |
2020-09-09 03:13:34 |
| 77.0.218.36 | attackbots | Scanning |
2020-09-09 03:11:24 |
| 122.51.177.151 | attackbots | Sep 8 20:23:22 ift sshd\[23159\]: Failed password for root from 122.51.177.151 port 46112 ssh2Sep 8 20:26:28 ift sshd\[23751\]: Invalid user oracle from 122.51.177.151Sep 8 20:26:30 ift sshd\[23751\]: Failed password for invalid user oracle from 122.51.177.151 port 52256 ssh2Sep 8 20:29:34 ift sshd\[24156\]: Failed password for root from 122.51.177.151 port 58402 ssh2Sep 8 20:32:37 ift sshd\[24844\]: Invalid user sinus from 122.51.177.151 ... |
2020-09-09 02:51:13 |
| 171.117.129.246 | attack |
|
2020-09-09 02:46:51 |
| 1.54.87.8 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-09 02:47:34 |