City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.49.82.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11459
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;53.49.82.147. IN A
;; AUTHORITY SECTION:
. 374 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023011100 1800 900 604800 86400
;; Query time: 245 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 20:54:38 CST 2023
;; MSG SIZE rcvd: 105
Host 147.82.49.53.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 147.82.49.53.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.220.101.134 | attackbots | 2020-09-10 17:32:18.291418-0500 localhost sshd[40294]: Failed password for root from 185.220.101.134 port 9494 ssh2 |
2020-09-11 07:43:56 |
| 203.90.233.7 | attackspambots | Sep 11 01:59:16 localhost sshd\[17921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.90.233.7 user=root Sep 11 01:59:18 localhost sshd\[17921\]: Failed password for root from 203.90.233.7 port 45851 ssh2 Sep 11 02:01:17 localhost sshd\[18090\]: Invalid user sandra from 203.90.233.7 Sep 11 02:01:17 localhost sshd\[18090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.90.233.7 Sep 11 02:01:18 localhost sshd\[18090\]: Failed password for invalid user sandra from 203.90.233.7 port 60411 ssh2 ... |
2020-09-11 08:11:17 |
| 167.99.137.75 | attackbotsspam | Sep 10 22:35:31 vps8769 sshd[7674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.137.75 Sep 10 22:35:33 vps8769 sshd[7674]: Failed password for invalid user unithkd from 167.99.137.75 port 35392 ssh2 ... |
2020-09-11 07:51:00 |
| 165.22.27.210 | attackspambots | 165.22.27.210 - - \[10/Sep/2020:18:54:59 +0200\] "GET /index.php\?id=ausland%5D-%28SELECT%2F%2A\&id=%2A%2F0%2F%2A\&id=%2A%2FWHERE%2F%2A\&id=%2A%2F9047%3D9047%2F%2A\&id=%2A%2FAND%2F%2A\&id=%2A%2F6877%3D%28SELECT%2F%2A\&id=%2A%2F%28CASE%2F%2A\&id=%2A%2FWHEN%2F%2A\&id=%2A%2F%286877%3D5003%29%2F%2A\&id=%2A%2FTHEN%2F%2A\&id=%2A%2F6877%2F%2A\&id=%2A%2FELSE%2F%2A\&id=%2A%2F%28SELECT%2F%2A\&id=%2A%2F5003%2F%2A\&id=%2A%2FUNION%2F%2A\&id=%2A%2FSELECT%2F%2A\&id=%2A%2F5391%29%2F%2A\&id=%2A%2FEND%29%29--%2F%2A\&id=%2A%2FaZBH HTTP/1.1" 200 12305 "http://www.firma-lsf.eu:80/index.php" "Googlebot \(compatible Googlebot/2.1 http://www.google.com/bot.html\)" ... |
2020-09-11 08:10:22 |
| 37.57.82.137 | attack | Lines containing failures of 37.57.82.137 (max 1000) Sep 10 15:54:16 UTC__SANYALnet-Labs__cac1 sshd[27968]: Connection from 37.57.82.137 port 44422 on 64.137.179.160 port 22 Sep 10 15:54:16 UTC__SANYALnet-Labs__cac1 sshd[27970]: Connection from 37.57.82.137 port 44616 on 64.137.179.160 port 22 Sep 10 15:54:19 UTC__SANYALnet-Labs__cac1 sshd[27970]: Address 37.57.82.137 maps to 137.82.57.37.triolan.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 10 15:54:19 UTC__SANYALnet-Labs__cac1 sshd[27970]: User r.r from 37.57.82.137 not allowed because not listed in AllowUsers Sep 10 15:54:19 UTC__SANYALnet-Labs__cac1 sshd[27970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.57.82.137 user=r.r Sep 10 15:54:21 UTC__SANYALnet-Labs__cac1 sshd[27970]: Failed password for invalid user r.r from 37.57.82.137 port 44616 ssh2 Sep 10 15:54:21 UTC__SANYALnet-Labs__cac1 sshd[27970]: Connection closed by 37.57.82.137 p........ ------------------------------ |
2020-09-11 07:53:01 |
| 104.168.44.234 | attackspambots | 5x Failed Password |
2020-09-11 08:12:37 |
| 127.0.0.1 | attack | Test Connectivity |
2020-09-11 07:40:15 |
| 91.126.181.199 | attackbotsspam | Sep 10 18:55:15 db sshd[26613]: User root from 91.126.181.199 not allowed because none of user's groups are listed in AllowGroups ... |
2020-09-11 07:57:14 |
| 181.46.164.9 | attack | (cxs) cxs mod_security triggered by 181.46.164.9 (AR/Argentina/cpe-181-46-164-9.telecentro-reversos.com.ar): 1 in the last 3600 secs (CF_ENABLE); Ports: *; Direction: inout; Trigger: LF_CXS; Logs: [Thu Sep 10 18:55:20.401814 2020] [:error] [pid 3943566:tid 47466712020736] [client 181.46.164.9:17461] [client 181.46.164.9] ModSecurity: Access denied with code 403 (phase 2). File "/tmp/20200910-185518-X1padp1cg7rkBOBCfBdcDgAAAA0-file-JRUfUL" rejected by the approver script "/etc/cxs/cxscgi.sh": 0 [file "/etc/apache2/conf.d/modsec_vendor_configs/configserver/00_configserver.conf"] [line "7"] [id "1010101"] [msg "ConfigServer Exploit Scanner (cxs) triggered"] [severity "CRITICAL"] [hostname "gastro-ptuj.si"] [uri "/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php"] [unique_id "X1padp1cg7rkBOBCfBdcDgAAAA0"], referer: http://gastro-ptuj.si/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php |
2020-09-11 07:48:40 |
| 60.249.82.121 | attack | Sep 10 16:20:30 Tower sshd[10465]: Connection from 60.249.82.121 port 40460 on 192.168.10.220 port 22 rdomain "" Sep 10 16:20:31 Tower sshd[10465]: Failed password for root from 60.249.82.121 port 40460 ssh2 Sep 10 16:20:32 Tower sshd[10465]: Received disconnect from 60.249.82.121 port 40460:11: Bye Bye [preauth] Sep 10 16:20:32 Tower sshd[10465]: Disconnected from authenticating user root 60.249.82.121 port 40460 [preauth] |
2020-09-11 08:01:08 |
| 58.226.79.146 | attack | Invalid user netman from 58.226.79.146 port 34214 |
2020-09-11 07:54:13 |
| 54.36.163.141 | attackspambots | Sep 11 01:35:05 santamaria sshd\[10542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.141 user=root Sep 11 01:35:08 santamaria sshd\[10542\]: Failed password for root from 54.36.163.141 port 49472 ssh2 Sep 11 01:39:32 santamaria sshd\[10663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.141 user=root ... |
2020-09-11 07:45:32 |
| 49.233.128.229 | attackspam | prod6 ... |
2020-09-11 07:38:19 |
| 5.62.62.54 | attackbots | Brute force attack stopped by firewall |
2020-09-11 07:45:48 |
| 165.227.101.226 | attackspam | SSH Invalid Login |
2020-09-11 07:57:41 |