City: unknown
Region: unknown
Country: Ireland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.21.104.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.21.104.106. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:22:06 CST 2025
;; MSG SIZE rcvd: 106
Host 106.104.21.57.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 106.104.21.57.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 13.73.159.163 | attack | [SatFeb0101:09:42.6533802020][:error][pid32360:tid47092635195136][client13.73.159.163:59998][client13.73.159.163]ModSecurity:Accessdeniedwithcode403\(phase2\).File"/tmp/20200201-010942-XjTBxewwATcLkB3zyHf4MgAAAQs-file-x2Pryc"rejectedbytheapproverscript"/etc/cxs/cxscgi.sh":0[file"/etc/apache2/conf.d/modsec_vendor_configs/configserver/00_configserver.conf"][line"7"][id"1010101"][msg"ConfigServerExploitScanner\(cxs\)triggered"][severity"CRITICAL"][hostname"ponzellini.ch"][uri"/wp-admin/admin-post.php"][unique_id"XjTBxewwATcLkB3zyHf4MgAAAQs"] |
2020-02-01 10:53:01 |
| 45.226.81.197 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.226.81.197 to port 2220 [J] |
2020-02-01 10:32:46 |
| 187.170.89.24 | attack | Unauthorized connection attempt from IP address 187.170.89.24 on Port 445(SMB) |
2020-02-01 10:52:15 |
| 91.134.142.57 | attack | $f2bV_matches |
2020-02-01 10:35:01 |
| 222.186.52.139 | attack | Unauthorized connection attempt detected from IP address 222.186.52.139 to port 22 [J] |
2020-02-01 10:17:35 |
| 113.61.111.251 | attack | Unauthorized connection attempt from IP address 113.61.111.251 on Port 445(SMB) |
2020-02-01 10:22:22 |
| 212.156.221.69 | attackspambots | Unauthorized connection attempt detected from IP address 212.156.221.69 to port 2220 [J] |
2020-02-01 10:35:32 |
| 111.93.246.171 | attackbotsspam | Invalid user kavya from 111.93.246.171 port 49466 |
2020-02-01 10:16:35 |
| 186.3.234.169 | attackspam | Unauthorized connection attempt detected from IP address 186.3.234.169 to port 2220 [J] |
2020-02-01 10:37:28 |
| 186.88.53.167 | attackbotsspam | Unauthorized connection attempt from IP address 186.88.53.167 on Port 445(SMB) |
2020-02-01 10:15:28 |
| 125.213.150.7 | attack | Feb 1 01:11:28 mout sshd[10178]: Invalid user dspace from 125.213.150.7 port 46108 |
2020-02-01 10:22:59 |
| 132.232.48.121 | attackspambots | Unauthorized connection attempt detected from IP address 132.232.48.121 to port 2220 [J] |
2020-02-01 10:46:16 |
| 18.197.100.150 | attackbotsspam | [FriJan3122:30:40.3758352020][:error][pid12190:tid47392770438912][client18.197.100.150:51104][client18.197.100.150]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\\\\\\\.conf\|boot\\\\\\\\.ini\|web.config\)\\\\\\\\b\|\(\|\^\|\\\\\\\\.\\\\\\\\.\)/etc/\|/\\\\\\\\.\(\?:history\|bash_history\|sh_history\|env\)\$\)"atREQUEST_FILENAME.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"211"][id"390709"][rev"30"][msg"Atomicorp.comWAFRules:Attempttoaccessprotectedfileremotely"][data"/.env"][severity"CRITICAL"][hostname"staufferpittura.ch"][uri"/.env"][unique_id"XjScgBZ2LVVmbSpBd99r6AAAAAU"][FriJan3122:30:43.5804162020][:error][pid12190:tid47392774641408][client18.197.100.150:45536][client18.197.100.150]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd |
2020-02-01 10:24:09 |
| 222.186.31.83 | attackspam | Jan 31 23:16:41 firewall sshd[20307]: Failed password for root from 222.186.31.83 port 19275 ssh2 Jan 31 23:16:43 firewall sshd[20307]: Failed password for root from 222.186.31.83 port 19275 ssh2 Jan 31 23:16:46 firewall sshd[20307]: Failed password for root from 222.186.31.83 port 19275 ssh2 ... |
2020-02-01 10:26:37 |
| 221.134.152.66 | attackbotsspam | Unauthorized connection attempt from IP address 221.134.152.66 on Port 445(SMB) |
2020-02-01 10:24:32 |