City: unknown
Region: unknown
Country: Russia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.80.107.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42791
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.80.107.249. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 06:40:53 CST 2019
;; MSG SIZE rcvd: 117
Host 249.107.80.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 249.107.80.45.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
136.145.249.146 | attackspambots | 2019-10-23 11:43:27 1iNDAs-0006Hj-IH SMTP connection from \(\[136.145.249.146\]\) \[136.145.249.146\]:31009 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 11:43:37 1iNDB2-0006Hx-M1 SMTP connection from \(\[136.145.249.146\]\) \[136.145.249.146\]:31139 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 11:43:46 1iNDBB-0006IA-4s SMTP connection from \(\[136.145.249.146\]\) \[136.145.249.146\]:31226 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 01:31:47 |
198.108.66.112 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-05 01:46:46 |
106.13.95.27 | attackbotsspam | Feb 4 06:12:30 hpm sshd\[16798\]: Invalid user cameryn1 from 106.13.95.27 Feb 4 06:12:30 hpm sshd\[16798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.95.27 Feb 4 06:12:32 hpm sshd\[16798\]: Failed password for invalid user cameryn1 from 106.13.95.27 port 45588 ssh2 Feb 4 06:16:43 hpm sshd\[17819\]: Invalid user rost from 106.13.95.27 Feb 4 06:16:43 hpm sshd\[17819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.95.27 |
2020-02-05 01:47:01 |
121.149.221.186 | attackspambots | Feb 4 14:50:19 grey postfix/smtpd\[26854\]: NOQUEUE: reject: RCPT from unknown\[121.149.221.186\]: 554 5.7.1 Service unavailable\; Client host \[121.149.221.186\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?121.149.221.186\; from=\ |
2020-02-05 01:33:22 |
134.73.7.236 | attackspambots | 2019-05-04 05:37:49 1hMlUj-0004nN-AL SMTP connection from precinct.sandyfadadu.com \(precinct.acarifagic.icu\) \[134.73.7.236\]:49521 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-05-04 05:41:20 1hMlY8-0004tq-9E SMTP connection from precinct.sandyfadadu.com \(precinct.acarifagic.icu\) \[134.73.7.236\]:50128 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-05-04 05:41:21 1hMlY9-0004tr-FV SMTP connection from precinct.sandyfadadu.com \(precinct.acarifagic.icu\) \[134.73.7.236\]:52484 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 01:59:59 |
187.190.75.217 | attackspambots | Feb 4 14:50:05 grey postfix/smtpd\[12061\]: NOQUEUE: reject: RCPT from fixed-187-190-75-217.totalplay.net\[187.190.75.217\]: 554 5.7.1 Service unavailable\; Client host \[187.190.75.217\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=187.190.75.217\; from=\ |
2020-02-05 01:44:52 |
134.73.7.250 | attackbotsspam | 2019-05-07 13:24:19 1hNyCo-0002sR-OX SMTP connection from bag.sandyfadadu.com \(bag.ifineinteriors.icu\) \[134.73.7.250\]:46382 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-05-07 13:24:50 1hNyDJ-0002sz-Rj SMTP connection from bag.sandyfadadu.com \(bag.ifineinteriors.icu\) \[134.73.7.250\]:56772 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-05-07 13:27:34 1hNyFy-0002xp-9b SMTP connection from bag.sandyfadadu.com \(bag.ifineinteriors.icu\) \[134.73.7.250\]:52997 I=\[193.107.90.29\]:25 closed by DROP in ACL ... |
2020-02-05 01:41:56 |
135.0.89.100 | attackbotsspam | 2019-07-07 14:18:14 1hk67S-0007yC-8y SMTP connection from \(\[135.0.89.100\]\) \[135.0.89.100\]:45049 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 14:18:33 1hk67l-0007yO-Ch SMTP connection from \(\[135.0.89.100\]\) \[135.0.89.100\]:45190 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 14:18:43 1hk67u-0007yY-Cy SMTP connection from \(\[135.0.89.100\]\) \[135.0.89.100\]:45265 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 01:32:49 |
1.234.23.23 | attack | Feb 4 13:48:12 game-panel sshd[17801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.234.23.23 Feb 4 13:48:14 game-panel sshd[17801]: Failed password for invalid user angelyn from 1.234.23.23 port 49794 ssh2 Feb 4 13:49:54 game-panel sshd[17849]: Failed password for root from 1.234.23.23 port 33000 ssh2 |
2020-02-05 02:02:19 |
134.73.87.133 | attackbotsspam | 2019-11-11 16:13:43 SMTP protocol error in "AUTH LOGIN" H=\(Bipidbveim\) \[134.73.87.133\]:64102 I=\[193.107.88.166\]:25 AUTH command used when not advertised 2019-11-11 16:13:44 SMTP protocol error in "AUTH LOGIN" H=\(fqfKgT\) \[134.73.87.133\]:56481 I=\[193.107.88.166\]:25 AUTH command used when not advertised 2019-11-11 16:13:45 SMTP protocol error in "AUTH LOGIN" H=\(iju5hoHIse\) \[134.73.87.133\]:58510 I=\[193.107.88.166\]:25 AUTH command used when not advertised 2019-11-11 16:13:46 SMTP protocol error in "AUTH LOGIN" H=\(c8ECeuXm\) \[134.73.87.133\]:62349 I=\[193.107.88.166\]:25 AUTH command used when not advertised 2019-11-11 16:14:59 SMTP protocol error in "AUTH LOGIN" H=\(VTwFlT\) \[134.73.87.133\]:52976 I=\[193.107.88.166\]:587 AUTH command used when not advertised 2019-11-11 16:15:00 SMTP protocol error in "AUTH LOGIN" H=\(JxkCEio\) \[134.73.87.133\]:63086 I=\[193.107.88.166\]:587 AUTH command used when not advertised 2019-11-11 16:15:01 SMTP protocol error in "AUTH LOGIN" H ... |
2020-02-05 01:34:49 |
66.220.149.15 | attackspambots | [Tue Feb 04 20:50:11.983466 2020] [:error] [pid 2034:tid 140558491895552] [client 66.220.149.15:40430] [client 66.220.149.15] ModSecurity: Access denied with code 403 (phase 2). Found 3 byte(s) in REQUEST_URI outside range: 32-36,38-126. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "1304"] [id "920272"] [msg "Invalid character in request (outside of printable chars below ascii 127)"] [data "REQUEST_URI=/images/Klimatologi/Analisis/02-Analisis_Dasarian/Dinamika/2020/01_Januari_2020/Das-III/Analisis_Dinamika_Atmosfer\\xe2\\x80\\x93Laut_Dan_Prediksi_Curah_Hujan_Update_Dasarian_III_Januari_2020.jpg"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/EVASION"] [tag "paranoia-level/3"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/images/Klimatologi/Analisis/02-Analisis_Dasarian/Dinamika/ ... |
2020-02-05 01:39:46 |
123.133.112.42 | attack | Feb 4 18:44:06 v22018076622670303 sshd\[21855\]: Invalid user postgres from 123.133.112.42 port 44160 Feb 4 18:44:06 v22018076622670303 sshd\[21855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.133.112.42 Feb 4 18:44:08 v22018076622670303 sshd\[21855\]: Failed password for invalid user postgres from 123.133.112.42 port 44160 ssh2 ... |
2020-02-05 01:53:15 |
138.122.96.80 | attackbotsspam | 2019-03-11 20:34:29 H=\(\[138.122.96.80\]\) \[138.122.96.80\]:13237 I=\[193.107.88.166\]:25 F=\ |
2020-02-05 01:21:49 |
80.150.95.170 | attackspambots | Feb 4 12:29:55 plusreed sshd[6206]: Invalid user gogs from 80.150.95.170 ... |
2020-02-05 01:36:20 |
117.218.63.25 | attackbots | Unauthorized connection attempt detected from IP address 117.218.63.25 to port 2220 [J] |
2020-02-05 01:24:47 |