City: Halmstad
Region: Halland
Country: Sweden
Internet Service Provider: Tele2
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 37.199.46.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;37.199.46.1. IN A
;; AUTHORITY SECTION:
. 325 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019112501 1800 900 604800 86400
;; Query time: 925 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 26 04:46:42 CST 2019
;; MSG SIZE rcvd: 115
1.46.199.37.in-addr.arpa domain name pointer m37-199-46-1.cust.tele2.se.
Server: 100.100.2.136
Address: 100.100.2.136#53
Non-authoritative answer:
1.46.199.37.in-addr.arpa name = m37-199-46-1.cust.tele2.se.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.221.234.246 | attackspam | Unauthorized access detected from black listed ip! |
2020-04-21 14:28:29 |
| 165.227.50.73 | attackspambots | 165.227.50.73 - - [21/Apr/2020:05:54:39 +0200] "GET /wp-login.php HTTP/1.1" 200 5686 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.227.50.73 - - [21/Apr/2020:05:54:41 +0200] "POST /wp-login.php HTTP/1.1" 200 5997 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.227.50.73 - - [21/Apr/2020:05:54:42 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-21 14:39:19 |
| 113.187.176.69 | attack | "SSH brute force auth login attempt." |
2020-04-21 14:24:10 |
| 51.89.213.85 | attackbotsspam | [Tue Apr 21 10:54:36.753391 2020] [:error] [pid 24578:tid 139755073300224] [client 51.89.213.85:47876] [client 51.89.213.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/mOh9"] [unique_id "Xp5ufIXHylZjbS26Ybc7QAAAAh0"] ... |
2020-04-21 14:43:40 |
| 80.82.70.118 | attack | 3388/tcp 23/tcp 5001/tcp... [2020-02-20/04-21]917pkt,64pt.(tcp) |
2020-04-21 14:43:13 |
| 106.124.129.115 | attackspambots | Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-04-21 14:44:30 |
| 14.54.113.164 | attackbots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-04-21 14:31:24 |
| 89.248.168.221 | attack | [MK-VM3] Blocked by UFW |
2020-04-21 14:40:45 |
| 14.241.230.89 | attack | " " |
2020-04-21 14:34:04 |
| 129.211.138.177 | attackspam | 3x Failed Password |
2020-04-21 14:53:13 |
| 118.163.71.101 | attackspam | [21/Apr/2020:05:54:22 +0200] Web-Request: "GET /phpMyAdmin/scripts/setup.php", User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0" |
2020-04-21 14:53:36 |
| 187.1.20.92 | attackspam | Automatic report - Port Scan Attack |
2020-04-21 14:51:33 |
| 103.236.253.28 | attackbots | Apr 21 06:52:31 lukav-desktop sshd\[14677\]: Invalid user testmail from 103.236.253.28 Apr 21 06:52:31 lukav-desktop sshd\[14677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.253.28 Apr 21 06:52:33 lukav-desktop sshd\[14677\]: Failed password for invalid user testmail from 103.236.253.28 port 47528 ssh2 Apr 21 06:55:04 lukav-desktop sshd\[14826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.253.28 user=root Apr 21 06:55:06 lukav-desktop sshd\[14826\]: Failed password for root from 103.236.253.28 port 56622 ssh2 |
2020-04-21 14:17:20 |
| 62.234.83.138 | attack | Apr 21 05:53:34 sshgateway sshd\[23366\]: Invalid user postgres from 62.234.83.138 Apr 21 05:53:34 sshgateway sshd\[23366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.83.138 Apr 21 05:53:37 sshgateway sshd\[23366\]: Failed password for invalid user postgres from 62.234.83.138 port 47394 ssh2 |
2020-04-21 14:56:20 |
| 115.49.246.98 | attack | Automatic report - Port Scan Attack |
2020-04-21 14:21:09 |