City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.124.4.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8984
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;56.124.4.145. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:46:07 CST 2025
;; MSG SIZE rcvd: 105
145.4.124.56.in-addr.arpa domain name pointer ec2-56-124-4-145.sa-east-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.4.124.56.in-addr.arpa name = ec2-56-124-4-145.sa-east-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 216.18.204.196 | attackbotsspam | Brute force attack stopped by firewall |
2020-09-14 20:42:33 |
| 74.120.14.30 | attackbots | firewall-block, port(s): 47808/udp |
2020-09-14 21:05:10 |
| 106.13.19.75 | attack | Sep 14 14:24:05 abendstille sshd\[28312\]: Invalid user esuser from 106.13.19.75 Sep 14 14:24:05 abendstille sshd\[28312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.19.75 Sep 14 14:24:08 abendstille sshd\[28312\]: Failed password for invalid user esuser from 106.13.19.75 port 51980 ssh2 Sep 14 14:27:54 abendstille sshd\[32078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.19.75 user=root Sep 14 14:27:56 abendstille sshd\[32078\]: Failed password for root from 106.13.19.75 port 44366 ssh2 ... |
2020-09-14 20:28:59 |
| 212.237.42.236 | attack | Sep 14 14:42:03 vmd17057 sshd[15362]: Failed password for root from 212.237.42.236 port 17206 ssh2 Sep 14 14:42:07 vmd17057 sshd[15362]: Failed password for root from 212.237.42.236 port 17206 ssh2 ... |
2020-09-14 21:06:16 |
| 168.63.255.118 | attackbots | SSH/22 MH Probe, BF, Hack - |
2020-09-14 20:34:52 |
| 49.233.54.98 | attackbots | 5x Failed Password |
2020-09-14 20:52:47 |
| 187.26.177.59 | attack | (sshd) Failed SSH login from 187.26.177.59 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 13 12:58:48 jbs1 sshd[2095]: Failed password for root from 187.26.177.59 port 7284 ssh2 Sep 13 12:58:52 jbs1 sshd[2121]: Failed password for root from 187.26.177.59 port 7285 ssh2 Sep 13 12:58:53 jbs1 sshd[2136]: Invalid user ubnt from 187.26.177.59 Sep 13 12:58:55 jbs1 sshd[2136]: Failed password for invalid user ubnt from 187.26.177.59 port 7286 ssh2 Sep 13 12:58:58 jbs1 sshd[2156]: Failed password for root from 187.26.177.59 port 7287 ssh2 |
2020-09-14 20:53:11 |
| 156.215.221.17 | attack | 1600016363 - 09/13/2020 18:59:23 Host: 156.215.221.17/156.215.221.17 Port: 445 TCP Blocked |
2020-09-14 20:45:23 |
| 18.141.56.216 | attack | Sep 14 02:31:38 propaganda sshd[40579]: Connection from 18.141.56.216 port 58936 on 10.0.0.161 port 22 rdomain "" Sep 14 02:31:39 propaganda sshd[40579]: Connection closed by 18.141.56.216 port 58936 [preauth] |
2020-09-14 20:44:14 |
| 115.99.110.188 | attackspambots | [Sun Sep 13 23:59:41.973617 2020] [:error] [pid 32346:tid 140175820666624] [client 115.99.110.188:44240] [client 115.99.110.188] ModSecurity: Access denied with code 403 (phase 1). Match of "rx ^%{tx.allowed_request_content_type_charset}$" against "TX:1" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "944"] [id "920480"] [msg "Request content type charset is not allowed by policy"] [data "\\x22utf-8\\x22"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/CONTENT_TYPE_CHARSET"] [tag "WASCTC/WASC-20"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/EE2"] [tag "PCI/12.1"] [hostname "103.27.207.197"] [uri "/HNAP1/"] [unique_id "X15P-TGicopo-RlqvxhcuQAAADo"]
... |
2020-09-14 20:33:37 |
| 111.231.71.157 | attackspambots | Sep 14 13:06:40 ns382633 sshd\[19435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 user=root Sep 14 13:06:42 ns382633 sshd\[19435\]: Failed password for root from 111.231.71.157 port 59754 ssh2 Sep 14 13:25:04 ns382633 sshd\[23015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 user=root Sep 14 13:25:07 ns382633 sshd\[23015\]: Failed password for root from 111.231.71.157 port 39710 ssh2 Sep 14 13:33:33 ns382633 sshd\[24865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 user=root |
2020-09-14 20:55:23 |
| 122.51.198.90 | attackspam | 122.51.198.90 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 14 03:37:49 server2 sshd[6374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.90 user=root Sep 14 03:37:51 server2 sshd[6374]: Failed password for root from 122.51.198.90 port 51732 ssh2 Sep 14 03:37:26 server2 sshd[6285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.165.83 user=root Sep 14 03:38:01 server2 sshd[6397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.237.191.186 user=root Sep 14 03:37:28 server2 sshd[6285]: Failed password for root from 106.13.165.83 port 47260 ssh2 Sep 14 03:35:41 server2 sshd[3499]: Failed password for root from 50.68.200.101 port 58672 ssh2 IP Addresses Blocked: |
2020-09-14 20:26:01 |
| 199.115.230.39 | attack | Failed password for invalid user ghost from 199.115.230.39 port 47808 ssh2 |
2020-09-14 20:36:29 |
| 210.56.23.100 | attackspam | sshd jail - ssh hack attempt |
2020-09-14 20:55:10 |
| 196.218.133.199 | attackbots |
|
2020-09-14 20:58:12 |