City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.124.141.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.124.141.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 17:07:31 CST 2025
;; MSG SIZE rcvd: 107
Host 164.141.124.44.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 164.141.124.44.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
122.51.18.119 | attackspam | Aug 28 00:10:02 h1745522 sshd[27934]: Invalid user untu from 122.51.18.119 port 49964 Aug 28 00:10:02 h1745522 sshd[27934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.18.119 Aug 28 00:10:02 h1745522 sshd[27934]: Invalid user untu from 122.51.18.119 port 49964 Aug 28 00:10:04 h1745522 sshd[27934]: Failed password for invalid user untu from 122.51.18.119 port 49964 ssh2 Aug 28 00:13:25 h1745522 sshd[29370]: Invalid user vpnuser from 122.51.18.119 port 46422 Aug 28 00:13:25 h1745522 sshd[29370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.18.119 Aug 28 00:13:25 h1745522 sshd[29370]: Invalid user vpnuser from 122.51.18.119 port 46422 Aug 28 00:13:26 h1745522 sshd[29370]: Failed password for invalid user vpnuser from 122.51.18.119 port 46422 ssh2 Aug 28 00:16:44 h1745522 sshd[32281]: Invalid user dados from 122.51.18.119 port 42864 ... |
2020-08-28 07:11:53 |
167.99.10.162 | attack | MYH,DEF GET /test/wp-login.php |
2020-08-28 07:47:28 |
89.203.142.10 | attack | Aug 27 18:46:09 mail.srvfarm.net postfix/smtpd[1678851]: warning: unknown[89.203.142.10]: SASL PLAIN authentication failed: Aug 27 18:46:09 mail.srvfarm.net postfix/smtpd[1678851]: lost connection after AUTH from unknown[89.203.142.10] Aug 27 18:47:47 mail.srvfarm.net postfix/smtpd[1680648]: warning: unknown[89.203.142.10]: SASL PLAIN authentication failed: Aug 27 18:47:47 mail.srvfarm.net postfix/smtpd[1680648]: lost connection after AUTH from unknown[89.203.142.10] Aug 27 18:53:50 mail.srvfarm.net postfix/smtpd[1680648]: warning: unknown[89.203.142.10]: SASL PLAIN authentication failed: |
2020-08-28 07:13:43 |
2.200.81.206 | attackbots | srvr1: (mod_security) mod_security (id:920350) triggered by 2.200.81.206 (DE/-/dslb-002-200-081-206.002.200.pools.vodafone-ip.de): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/27 21:06:59 [error] 155659#0: *426673 [client 2.200.81.206] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host' [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/phpmyadmin/"] [unique_id "15985624191.983664"] [ref "o0,13v155,13"], client: 2.200.81.206, [redacted] request: "GET /phpmyadmin/ HTTP/1.1" [redacted] |
2020-08-28 07:42:42 |
119.96.159.71 | attackbots | Time: Thu Aug 27 21:05:28 2020 +0000 IP: 119.96.159.71 (CN/China/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Aug 27 20:34:49 pv-14-ams2 sshd[29629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.159.71 user=root Aug 27 20:34:51 pv-14-ams2 sshd[29629]: Failed password for root from 119.96.159.71 port 35396 ssh2 Aug 27 20:48:09 pv-14-ams2 sshd[7893]: Invalid user www from 119.96.159.71 port 58968 Aug 27 20:48:10 pv-14-ams2 sshd[7893]: Failed password for invalid user www from 119.96.159.71 port 58968 ssh2 Aug 27 21:05:22 pv-14-ams2 sshd[31100]: Invalid user scheduler from 119.96.159.71 port 35000 |
2020-08-28 07:33:43 |
45.239.143.31 | attackspam | Aug 27 06:06:02 mail.srvfarm.net postfix/smtps/smtpd[1380111]: warning: unknown[45.239.143.31]: SASL PLAIN authentication failed: Aug 27 06:06:02 mail.srvfarm.net postfix/smtps/smtpd[1380111]: lost connection after AUTH from unknown[45.239.143.31] Aug 27 06:07:10 mail.srvfarm.net postfix/smtpd[1379880]: warning: unknown[45.239.143.31]: SASL PLAIN authentication failed: Aug 27 06:07:11 mail.srvfarm.net postfix/smtpd[1379880]: lost connection after AUTH from unknown[45.239.143.31] Aug 27 06:12:48 mail.srvfarm.net postfix/smtps/smtpd[1380110]: warning: unknown[45.239.143.31]: SASL PLAIN authentication failed: |
2020-08-28 07:14:17 |
111.229.85.222 | attack | Failed password for invalid user test3 from 111.229.85.222 port 51578 ssh2 |
2020-08-28 07:46:36 |
172.82.239.23 | attack | Aug 27 19:30:54 mail.srvfarm.net postfix/smtpd[1703307]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23] Aug 27 19:32:06 mail.srvfarm.net postfix/smtpd[1702612]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23] Aug 27 19:33:27 mail.srvfarm.net postfix/smtpd[1702803]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23] Aug 27 19:34:24 mail.srvfarm.net postfix/smtpd[1703303]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23] Aug 27 19:34:30 mail.srvfarm.net postfix/smtpd[1703310]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23] |
2020-08-28 07:43:54 |
210.16.187.206 | attackspambots | SSH Brute-Force. Ports scanning. |
2020-08-28 07:43:07 |
191.53.199.167 | attackbotsspam | Aug 27 08:46:49 mail.srvfarm.net postfix/smtpd[1434871]: warning: unknown[191.53.199.167]: SASL PLAIN authentication failed: Aug 27 08:46:49 mail.srvfarm.net postfix/smtpd[1434871]: lost connection after AUTH from unknown[191.53.199.167] Aug 27 08:54:31 mail.srvfarm.net postfix/smtpd[1434876]: warning: unknown[191.53.199.167]: SASL PLAIN authentication failed: Aug 27 08:54:31 mail.srvfarm.net postfix/smtpd[1434876]: lost connection after AUTH from unknown[191.53.199.167] Aug 27 08:56:37 mail.srvfarm.net postfix/smtpd[1435577]: warning: unknown[191.53.199.167]: SASL PLAIN authentication failed: |
2020-08-28 07:27:26 |
177.200.76.96 | attackbots | Aug 27 17:21:49 mail.srvfarm.net postfix/smtps/smtpd[1641001]: warning: 177-200-76-96.dynamic.skysever.com.br[177.200.76.96]: SASL PLAIN authentication failed: Aug 27 17:21:50 mail.srvfarm.net postfix/smtps/smtpd[1641001]: lost connection after AUTH from 177-200-76-96.dynamic.skysever.com.br[177.200.76.96] Aug 27 17:26:43 mail.srvfarm.net postfix/smtps/smtpd[1656467]: warning: 177-200-76-96.dynamic.skysever.com.br[177.200.76.96]: SASL PLAIN authentication failed: Aug 27 17:26:44 mail.srvfarm.net postfix/smtps/smtpd[1656467]: lost connection after AUTH from 177-200-76-96.dynamic.skysever.com.br[177.200.76.96] Aug 27 17:28:08 mail.srvfarm.net postfix/smtps/smtpd[1656466]: warning: 177-200-76-96.dynamic.skysever.com.br[177.200.76.96]: SASL PLAIN authentication failed: |
2020-08-28 07:30:07 |
106.124.130.114 | attackbotsspam | Aug 28 02:00:58 journals sshd\[38664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.130.114 user=root Aug 28 02:01:00 journals sshd\[38664\]: Failed password for root from 106.124.130.114 port 41491 ssh2 Aug 28 02:04:04 journals sshd\[39132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.130.114 user=mysql Aug 28 02:04:05 journals sshd\[39132\]: Failed password for mysql from 106.124.130.114 port 34537 ssh2 Aug 28 02:07:09 journals sshd\[39444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.130.114 user=root ... |
2020-08-28 07:12:10 |
45.227.98.102 | attackbotsspam | Aug 27 05:31:19 mail.srvfarm.net postfix/smtps/smtpd[1357934]: warning: unknown[45.227.98.102]: SASL PLAIN authentication failed: Aug 27 05:31:20 mail.srvfarm.net postfix/smtps/smtpd[1357934]: lost connection after AUTH from unknown[45.227.98.102] Aug 27 05:31:40 mail.srvfarm.net postfix/smtps/smtpd[1355069]: warning: unknown[45.227.98.102]: SASL PLAIN authentication failed: Aug 27 05:31:40 mail.srvfarm.net postfix/smtps/smtpd[1355069]: lost connection after AUTH from unknown[45.227.98.102] Aug 27 05:35:34 mail.srvfarm.net postfix/smtpd[1355299]: warning: unknown[45.227.98.102]: SASL PLAIN authentication failed: |
2020-08-28 07:40:06 |
62.210.194.9 | attackspambots | Aug 27 19:29:49 mail.srvfarm.net postfix/smtpd[1702802]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] Aug 27 19:29:49 mail.srvfarm.net postfix/smtpd[1702802]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] Aug 27 19:30:53 mail.srvfarm.net postfix/smtpd[1702940]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] Aug 27 19:32:08 mail.srvfarm.net postfix/smtpd[1703308]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] Aug 27 19:33:26 mail.srvfarm.net postfix/smtpd[1703307]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] |
2020-08-28 07:38:19 |
62.210.194.8 | attackspam | Aug 27 19:29:49 mail.srvfarm.net postfix/smtpd[1702148]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] Aug 27 19:29:50 mail.srvfarm.net postfix/smtpd[1702802]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] Aug 27 19:30:56 mail.srvfarm.net postfix/smtpd[1703311]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] Aug 27 19:32:08 mail.srvfarm.net postfix/smtpd[1703309]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] Aug 27 19:33:26 mail.srvfarm.net postfix/smtpd[1703312]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] |
2020-08-28 07:38:50 |