City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.120.109.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.120.109.75. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 12:32:52 CST 2025
;; MSG SIZE rcvd: 106
75.109.120.70.in-addr.arpa domain name pointer syn-070-120-109-075.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
75.109.120.70.in-addr.arpa name = syn-070-120-109-075.res.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 142.93.134.215 | attack | Aug 31 11:48:58 george sshd[17407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.134.215 Aug 31 11:49:00 george sshd[17407]: Failed password for invalid user tzq from 142.93.134.215 port 50072 ssh2 Aug 31 11:52:56 george sshd[17429]: Invalid user yxu from 142.93.134.215 port 59324 Aug 31 11:52:56 george sshd[17429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.134.215 Aug 31 11:52:59 george sshd[17429]: Failed password for invalid user yxu from 142.93.134.215 port 59324 ssh2 ... |
2020-09-01 00:18:11 |
| 172.105.249.56 | attack | [MonAug3114:33:34.5889062020][:error][pid24423:tid47243407456000][client172.105.249.56:46428][client172.105.249.56]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostname"81.17.25.249"][uri"/DbXmlInfo.xml"][unique_id"X0zuHgP2ul7LxEpvNSItAQAAAQo"][MonAug3114:33:55.6425032020][:error][pid24577:tid47243413759744][client172.105.249.56:33584][client172.105.249.56]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"python-requests/"atREQUEST_HEADERS:User-Agent.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"218"][id"332039"][rev"4"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(python-requests\).Disablethisruleifyouusepython-requests/."][severity"CRITICAL"][hostna |
2020-09-01 00:15:49 |
| 67.49.89.233 | attack |
|
2020-09-01 00:43:33 |
| 178.62.47.158 | attackspambots |
|
2020-09-01 00:18:34 |
| 144.172.73.39 | attackspambots | Aug 31 15:33:26 pkdns2 sshd\[37181\]: Invalid user honey from 144.172.73.39Aug 31 15:33:29 pkdns2 sshd\[37181\]: Failed password for invalid user honey from 144.172.73.39 port 54406 ssh2Aug 31 15:33:30 pkdns2 sshd\[37185\]: Invalid user admin from 144.172.73.39Aug 31 15:33:32 pkdns2 sshd\[37185\]: Failed password for invalid user admin from 144.172.73.39 port 56702 ssh2Aug 31 15:33:35 pkdns2 sshd\[37187\]: Failed password for root from 144.172.73.39 port 57784 ssh2Aug 31 15:33:38 pkdns2 sshd\[37189\]: Failed password for root from 144.172.73.39 port 58802 ssh2Aug 31 15:33:39 pkdns2 sshd\[37191\]: Invalid user admin from 144.172.73.39 ... |
2020-09-01 00:29:33 |
| 116.139.126.236 | attackspam | Unauthorised access (Aug 31) SRC=116.139.126.236 LEN=40 TTL=46 ID=13250 TCP DPT=8080 WINDOW=47202 SYN |
2020-09-01 00:34:21 |
| 187.85.181.162 | attack | Unauthorized connection attempt from IP address 187.85.181.162 on Port 445(SMB) |
2020-09-01 00:39:53 |
| 103.131.71.178 | attack | (mod_security) mod_security (id:210730) triggered by 103.131.71.178 (VN/Vietnam/bot-103-131-71-178.coccoc.com): 5 in the last 3600 secs |
2020-09-01 00:40:16 |
| 113.31.104.89 | attackbots | Aug 31 14:33:11 nehost postfix/smtpd[1780]: warning: unknown[113.31.104.89]: SASL LOGIN authentication failed: authentication failure Aug 31 14:33:14 nehost postfix/smtpd[1780]: warning: unknown[113.31.104.89]: SASL LOGIN authentication failed: authentication failure Aug 31 14:33:15 nehost postfix/smtpd[1780]: warning: unknown[113.31.104.89]: SASL LOGIN authentication failed: authentication failure |
2020-09-01 00:41:58 |
| 101.78.149.142 | attack | Aug 31 17:29:16 marvibiene sshd[28622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.149.142 Aug 31 17:29:19 marvibiene sshd[28622]: Failed password for invalid user sekretariat from 101.78.149.142 port 42114 ssh2 |
2020-09-01 00:12:15 |
| 118.123.244.100 | attackbots | Aug 31 16:03:21 OPSO sshd\[12164\]: Invalid user magno from 118.123.244.100 port 44936 Aug 31 16:03:21 OPSO sshd\[12164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.123.244.100 Aug 31 16:03:23 OPSO sshd\[12164\]: Failed password for invalid user magno from 118.123.244.100 port 44936 ssh2 Aug 31 16:05:05 OPSO sshd\[12383\]: Invalid user vbox from 118.123.244.100 port 60786 Aug 31 16:05:05 OPSO sshd\[12383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.123.244.100 |
2020-09-01 00:28:51 |
| 115.238.44.237 | attackspambots | Request Missing a Host Header |
2020-09-01 00:45:21 |
| 121.34.49.66 | attack | Unauthorized connection attempt from IP address 121.34.49.66 on Port 445(SMB) |
2020-09-01 00:51:38 |
| 194.61.26.211 | attack | Aug 31 13:33:11 ajax sshd[14577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.26.211 Aug 31 13:33:12 ajax sshd[14577]: Failed password for invalid user ubnt from 194.61.26.211 port 7362 ssh2 |
2020-09-01 00:49:16 |
| 110.78.146.127 | attackspambots | Unauthorized connection attempt from IP address 110.78.146.127 on Port 445(SMB) |
2020-09-01 00:24:59 |