City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
66.249.68.30 | attackspam | 404 NOT FOUND |
2020-09-27 02:02:20 |
66.249.68.30 | attack | 404 NOT FOUND |
2020-09-26 17:56:37 |
66.249.68.52 | attackspam | [Tue Aug 25 03:14:51.658211 2020] [:error] [pid 26844:tid 139693576779520] [client 66.249.68.52:62139] [client 66.249.68.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>]*?){6})" at ARGS:id. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "1526"] [id "942431"] [msg "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)"] [data "Matched Data: :analisis-dinamika-atmosfer-dan-laut- found within ARGS:id: 656:analisis-dinamika-atmosfer-dan-laut-dasarian-i-agustus-2017"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "OWASP_CRS"] [tag "OWASP_CRS/WEB ... |
2020-08-25 06:22:38 |
66.249.68.50 | attack | Unauthorized connection attempt detected, IP banned. |
2020-07-05 01:30:33 |
66.249.68.26 | attack | MYH,DEF GET /_adminer/adminer.php |
2020-06-24 14:04:37 |
66.249.68.16 | attackbots | $f2bV_matches |
2020-06-04 05:57:43 |
66.249.68.18 | attackspambots | $f2bV_matches |
2020-05-31 16:33:19 |
66.249.68.28 | attack | MYH,DEF GET /adminer123.php |
2020-03-03 15:44:47 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.249.68.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.249.68.2. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024120500 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 19:30:28 CST 2024
;; MSG SIZE rcvd: 104
2.68.249.66.in-addr.arpa domain name pointer crawl-66-249-68-2.googlebot.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.68.249.66.in-addr.arpa name = crawl-66-249-68-2.googlebot.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
1.170.244.198 | attack | Port Scan: TCP/23 |
2019-09-20 20:34:10 |
96.253.19.30 | attackspambots | Port Scan: TCP/7 |
2019-09-20 20:54:01 |
108.161.0.242 | attackspambots | Port Scan: UDP/137 |
2019-09-20 20:53:00 |
24.142.161.146 | attack | Port Scan: UDP/137 |
2019-09-20 20:32:23 |
24.213.231.234 | attack | Port Scan: UDP/137 |
2019-09-20 20:31:11 |
148.244.191.65 | attackbotsspam | Port Scan: TCP/445 |
2019-09-20 20:47:28 |
85.242.100.147 | attack | Port Scan: TCP/60001 |
2019-09-20 20:56:16 |
24.155.164.70 | attack | Port Scan: UDP/124 |
2019-09-20 20:31:53 |
64.207.241.37 | attackbotsspam | Port Scan: UDP/137 |
2019-09-20 20:24:47 |
46.12.25.92 | attackspambots | Port Scan: TCP/23 |
2019-09-20 20:28:23 |
148.251.50.77 | attack | Port Scan: UDP/53 |
2019-09-20 20:47:01 |
158.69.59.90 | attackbots | Port Scan: TCP/587 |
2019-09-20 20:46:14 |
67.44.208.0 | attack | Port Scan: UDP/80 |
2019-09-20 20:23:36 |
123.126.113.151 | attackspambots | This IP address was blacklisted for the following reason: /de/jobs/?p=1328 @ 2019-09-17T22:11:21+02:00. |
2019-09-20 20:48:34 |
201.229.93.157 | attackspambots | Port Scan: TCP/23 |
2019-09-20 20:38:29 |