City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.197.7.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58083
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;39.197.7.252.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:54:30 CST 2025
;; MSG SIZE  rcvd: 105
        Host 252.7.197.39.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 252.7.197.39.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 83.239.152.46 | attackspambots | Unauthorized connection attempt detected from IP address 83.239.152.46 to port 445 [T]  | 
                    2020-08-13 23:50:50 | 
| 125.165.217.94 | attackspambots | Unauthorized connection attempt detected from IP address 125.165.217.94 to port 445 [T]  | 
                    2020-08-14 00:32:38 | 
| 27.34.51.59 | attackbots | Unauthorized connection attempt detected from IP address 27.34.51.59 to port 445 [T]  | 
                    2020-08-14 00:19:40 | 
| 37.151.230.88 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack -  | 
                    2020-08-13 23:54:36 | 
| 35.221.220.51 | attack | Unauthorized connection attempt detected from IP address 35.221.220.51 to port 80 [T]  | 
                    2020-08-14 00:18:23 | 
| 142.93.163.152 | attackbotsspam | Unauthorized connection attempt detected from IP address 142.93.163.152 to port 11789 [T]  | 
                    2020-08-14 00:05:10 | 
| 108.53.145.212 | attackspambots | Unauthorized connection attempt detected from IP address 108.53.145.212 to port 445 [T]  | 
                    2020-08-14 00:09:45 | 
| 85.93.20.150 | attackspam | Unauthorized connection attempt detected from IP address 85.93.20.150 to port 3307 [T]  | 
                    2020-08-13 23:49:51 | 
| 61.177.172.102 | attack | Aug 13 17:51:15 minden010 sshd[4623]: Failed password for root from 61.177.172.102 port 42930 ssh2 Aug 13 17:51:17 minden010 sshd[4623]: Failed password for root from 61.177.172.102 port 42930 ssh2 Aug 13 17:51:20 minden010 sshd[4623]: Failed password for root from 61.177.172.102 port 42930 ssh2 ...  | 
                    2020-08-13 23:52:42 | 
| 162.241.153.250 | attackbots | IP 162.241.153.250 attacked honeypot on port: 2020 at 8/13/2020 6:38:22 AM  | 
                    2020-08-14 00:30:18 | 
| 129.213.152.224 | attackbots | srvr2: (mod_security) mod_security (id:920350) triggered by 129.213.152.224 (US/-/-): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/13 17:46:45 [error] 67397#0: *140925 [client 129.213.152.224] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host' [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "159733360580.408524"] [ref "o0,15v21,15"], client: 129.213.152.224, [redacted] request: "GET / HTTP/1.1" [redacted]  | 
                    2020-08-14 00:31:58 | 
| 200.232.172.171 | attackspam | Unauthorized connection attempt detected from IP address 200.232.172.171 to port 8080 [T]  | 
                    2020-08-14 00:24:32 | 
| 114.79.160.48 | attackspam | Unauthorized connection attempt detected from IP address 114.79.160.48 to port 445 [T]  | 
                    2020-08-14 00:08:05 | 
| 195.225.146.219 | attackbotsspam | Unauthorized connection attempt detected from IP address 195.225.146.219 to port 3389 [T]  | 
                    2020-08-14 00:24:46 | 
| 5.206.39.146 | attackspambots | Unauthorized connection attempt detected from IP address 5.206.39.146 to port 23 [T]  | 
                    2020-08-14 00:21:15 |