城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): Beijing Baidu Netcom Science and Technology Co. Ltd.
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Search Engine Spider
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attackbotsspam | May 27 21:31:28 electroncash sshd[64988]: Failed password for invalid user db2fenc1 from 106.12.43.142 port 40082 ssh2 May 27 21:34:42 electroncash sshd[710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 user=root May 27 21:34:43 electroncash sshd[710]: Failed password for root from 106.12.43.142 port 59554 ssh2 May 27 21:37:51 electroncash sshd[1710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 user=root May 27 21:37:54 electroncash sshd[1710]: Failed password for root from 106.12.43.142 port 50784 ssh2 ... |
2020-05-28 07:34:41 |
| attackspambots | May 3 05:48:16 sip sshd[32063]: Failed password for root from 106.12.43.142 port 42018 ssh2 May 3 05:53:06 sip sshd[1547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 May 3 05:53:08 sip sshd[1547]: Failed password for invalid user sshuser from 106.12.43.142 port 37640 ssh2 |
2020-05-03 15:15:13 |
| attackbotsspam | Invalid user ci from 106.12.43.142 port 51768 |
2020-04-23 14:00:38 |
| attackspam | Invalid user tester from 106.12.43.142 port 45436 |
2020-04-21 06:20:13 |
| attack | Apr 20 07:44:00 sxvn sshd[371692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 |
2020-04-20 17:42:43 |
| attackspam | Apr 2 03:48:00 vlre-nyc-1 sshd\[30778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 user=root Apr 2 03:48:03 vlre-nyc-1 sshd\[30778\]: Failed password for root from 106.12.43.142 port 52532 ssh2 Apr 2 03:56:24 vlre-nyc-1 sshd\[30974\]: Invalid user songbanghao from 106.12.43.142 Apr 2 03:56:24 vlre-nyc-1 sshd\[30974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 Apr 2 03:56:26 vlre-nyc-1 sshd\[30974\]: Failed password for invalid user songbanghao from 106.12.43.142 port 40116 ssh2 ... |
2020-04-02 15:59:35 |
| attack | Mar 28 23:41:35 eventyay sshd[23244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 Mar 28 23:41:37 eventyay sshd[23244]: Failed password for invalid user tcn from 106.12.43.142 port 38430 ssh2 Mar 28 23:49:52 eventyay sshd[23443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 ... |
2020-03-29 07:35:11 |
| attackspambots | k+ssh-bruteforce |
2020-03-26 13:15:28 |
| attack | 2020-03-25 13:48:45,965 fail2ban.actions: WARNING [ssh] Ban 106.12.43.142 |
2020-03-26 00:03:00 |
| attackspambots | Mar 25 05:22:31 h1745522 sshd[28618]: Invalid user r00t from 106.12.43.142 port 37642 Mar 25 05:22:31 h1745522 sshd[28618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 Mar 25 05:22:31 h1745522 sshd[28618]: Invalid user r00t from 106.12.43.142 port 37642 Mar 25 05:22:33 h1745522 sshd[28618]: Failed password for invalid user r00t from 106.12.43.142 port 37642 ssh2 Mar 25 05:26:51 h1745522 sshd[28745]: Invalid user ntps from 106.12.43.142 port 39694 Mar 25 05:26:51 h1745522 sshd[28745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 Mar 25 05:26:51 h1745522 sshd[28745]: Invalid user ntps from 106.12.43.142 port 39694 Mar 25 05:26:54 h1745522 sshd[28745]: Failed password for invalid user ntps from 106.12.43.142 port 39694 ssh2 Mar 25 05:31:00 h1745522 sshd[28827]: Invalid user n from 106.12.43.142 port 41740 ... |
2020-03-25 12:44:51 |
| attackbots | suspicious action Fri, 21 Feb 2020 10:16:02 -0300 |
2020-02-22 01:14:01 |
| attackbots | Feb 12 15:16:43 legacy sshd[2133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 Feb 12 15:16:45 legacy sshd[2133]: Failed password for invalid user zhang from 106.12.43.142 port 43050 ssh2 Feb 12 15:21:20 legacy sshd[2343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 ... |
2020-02-13 02:54:15 |
| attack | Unauthorized connection attempt detected from IP address 106.12.43.142 to port 2220 [J] |
2020-01-28 06:08:00 |
| attackspam | Jan 9 14:09:49 plesk sshd[1686]: Invalid user dsetiadi from 106.12.43.142 Jan 9 14:09:49 plesk sshd[1686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 Jan 9 14:09:50 plesk sshd[1686]: Failed password for invalid user dsetiadi from 106.12.43.142 port 43716 ssh2 Jan 9 14:09:50 plesk sshd[1686]: Received disconnect from 106.12.43.142: 11: Bye Bye [preauth] Jan 9 14:33:25 plesk sshd[3458]: Invalid user rankwatc from 106.12.43.142 Jan 9 14:33:25 plesk sshd[3458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.142 Jan 9 14:33:26 plesk sshd[3458]: Failed password for invalid user rankwatc from 106.12.43.142 port 58622 ssh2 Jan 9 14:33:26 plesk sshd[3458]: Received disconnect from 106.12.43.142: 11: Bye Bye [preauth] Jan 9 14:38:46 plesk sshd[3807]: Invalid user duj from 106.12.43.142 Jan 9 14:38:46 plesk sshd[3807]: pam_unix(sshd:auth): authentication failur........ ------------------------------- |
2020-01-12 07:23:23 |
| attack | 01/10/2020-09:12:37.326726 106.12.43.142 Protocol: 6 ET SCAN Potential SSH Scan |
2020-01-10 22:16:24 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.12.43.54 | attackbots | firewall-block, port(s): 2228/tcp |
2020-09-01 17:45:57 |
| 106.12.43.54 | attackspambots | srv02 Mass scanning activity detected Target: 1920 .. |
2020-08-27 18:13:11 |
| 106.12.43.54 | attack | Aug 19 23:35:50 r.ca sshd[18444]: Failed password for invalid user zhou from 106.12.43.54 port 50372 ssh2 |
2020-08-20 17:14:06 |
| 106.12.43.54 | attack | 31154/tcp 3453/tcp 19480/tcp... [2020-06-29/07-19]5pkt,5pt.(tcp) |
2020-07-20 07:36:35 |
| 106.12.43.54 | attackspambots | Jun 19 02:28:38 ArkNodeAT sshd\[17008\]: Invalid user ubuntu from 106.12.43.54 Jun 19 02:28:38 ArkNodeAT sshd\[17008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.54 Jun 19 02:28:41 ArkNodeAT sshd\[17008\]: Failed password for invalid user ubuntu from 106.12.43.54 port 37360 ssh2 |
2020-06-19 08:35:20 |
| 106.12.43.54 | attack | Jun 17 04:44:29 firewall sshd[17523]: Failed password for root from 106.12.43.54 port 52880 ssh2 Jun 17 04:46:25 firewall sshd[17608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.54 user=root Jun 17 04:46:27 firewall sshd[17608]: Failed password for root from 106.12.43.54 port 48824 ssh2 ... |
2020-06-17 15:55:49 |
| 106.12.43.54 | attack | Jun 15 09:43:43 ns382633 sshd\[4431\]: Invalid user bug from 106.12.43.54 port 53332 Jun 15 09:43:43 ns382633 sshd\[4431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.54 Jun 15 09:43:44 ns382633 sshd\[4431\]: Failed password for invalid user bug from 106.12.43.54 port 53332 ssh2 Jun 15 09:51:25 ns382633 sshd\[5946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.54 user=root Jun 15 09:51:27 ns382633 sshd\[5946\]: Failed password for root from 106.12.43.54 port 36958 ssh2 |
2020-06-15 18:50:07 |
| 106.12.43.54 | attackbotsspam | Jun 11 05:57:38 host sshd[24596]: Invalid user kiuchi from 106.12.43.54 port 38122 ... |
2020-06-11 13:25:24 |
| 106.12.43.54 | attackbotsspam | SSH brute-force attempt |
2020-06-03 21:16:47 |
| 106.12.43.54 | attackbots | Jun 2 16:58:42 ny01 sshd[27154]: Failed password for root from 106.12.43.54 port 47130 ssh2 Jun 2 17:02:28 ny01 sshd[27741]: Failed password for root from 106.12.43.54 port 43024 ssh2 |
2020-06-03 05:06:53 |
| 106.12.43.54 | attackspam | Invalid user contec123 from 106.12.43.54 port 51408 |
2020-05-16 08:04:06 |
| 106.12.43.54 | attackbotsspam | May 13 05:50:09 piServer sshd[31196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.43.54 May 13 05:50:12 piServer sshd[31196]: Failed password for invalid user shop from 106.12.43.54 port 32826 ssh2 May 13 05:59:21 piServer sshd[32431]: Failed password for root from 106.12.43.54 port 53220 ssh2 ... |
2020-05-13 12:35:44 |
| 106.12.43.54 | attackspam | Port scan(s) denied |
2020-05-02 15:36:43 |
| 106.12.43.66 | attackbots | "Unauthorized connection attempt on SSHD detected" |
2020-04-27 22:43:11 |
| 106.12.43.242 | attack | Apr 24 14:03:26 rotator sshd\[15297\]: Invalid user frappe from 106.12.43.242Apr 24 14:03:28 rotator sshd\[15297\]: Failed password for invalid user frappe from 106.12.43.242 port 45984 ssh2Apr 24 14:05:27 rotator sshd\[16084\]: Invalid user constructor from 106.12.43.242Apr 24 14:05:29 rotator sshd\[16084\]: Failed password for invalid user constructor from 106.12.43.242 port 42198 ssh2Apr 24 14:07:52 rotator sshd\[16110\]: Failed password for root from 106.12.43.242 port 38406 ssh2Apr 24 14:09:49 rotator sshd\[16150\]: Failed password for root from 106.12.43.242 port 34616 ssh2 ... |
2020-04-24 21:02:37 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.12.43.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.12.43.142. IN A
;; AUTHORITY SECTION:
. 193 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020011000 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 10 22:16:20 CST 2020
;; MSG SIZE rcvd: 117
Host 142.43.12.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.43.12.106.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 155.133.9.25 | attack | Jul 24 12:40:32 mail.srvfarm.net postfix/smtpd[2236045]: warning: unknown[155.133.9.25]: SASL PLAIN authentication failed: Jul 24 12:40:32 mail.srvfarm.net postfix/smtpd[2236045]: lost connection after AUTH from unknown[155.133.9.25] Jul 24 12:45:52 mail.srvfarm.net postfix/smtps/smtpd[2235275]: warning: unknown[155.133.9.25]: SASL PLAIN authentication failed: Jul 24 12:45:52 mail.srvfarm.net postfix/smtps/smtpd[2235275]: lost connection after AUTH from unknown[155.133.9.25] Jul 24 12:49:41 mail.srvfarm.net postfix/smtps/smtpd[2235282]: warning: unknown[155.133.9.25]: SASL PLAIN authentication failed: |
2020-07-25 01:24:51 |
| 77.223.91.25 | attack | Attempted connection to port 37777. |
2020-07-25 01:52:20 |
| 51.77.230.147 | attackbotsspam | Jul 24 18:45:15 mail.srvfarm.net postfix/smtpd[21988]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 18:45:15 mail.srvfarm.net postfix/smtpd[21988]: lost connection after AUTH from vps-113fc0af.vps.ovh.net[51.77.230.147] Jul 24 18:49:12 mail.srvfarm.net postfix/smtpd[6287]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 18:49:12 mail.srvfarm.net postfix/smtpd[6287]: lost connection after AUTH from vps-113fc0af.vps.ovh.net[51.77.230.147] Jul 24 18:49:16 mail.srvfarm.net postfix/smtpd[21931]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 18:49:16 mail.srvfarm.net postfix/smtpd[22074]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 18:49:16 mail.srvfarm.net postfix/smtpd[9321]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-07-25 01:43:59 |
| 78.186.68.175 | attack | Attempted connection to port 445. |
2020-07-25 01:51:51 |
| 200.66.117.134 | attackspam | Jul 24 12:27:58 mail.srvfarm.net postfix/smtpd[2217477]: warning: unknown[200.66.117.134]: SASL PLAIN authentication failed: Jul 24 12:27:58 mail.srvfarm.net postfix/smtpd[2217477]: lost connection after AUTH from unknown[200.66.117.134] Jul 24 12:35:26 mail.srvfarm.net postfix/smtps/smtpd[2233237]: warning: unknown[200.66.117.134]: SASL PLAIN authentication failed: Jul 24 12:35:27 mail.srvfarm.net postfix/smtps/smtpd[2233237]: lost connection after AUTH from unknown[200.66.117.134] Jul 24 12:35:32 mail.srvfarm.net postfix/smtps/smtpd[2233107]: warning: unknown[200.66.117.134]: SASL PLAIN authentication failed: |
2020-07-25 01:18:49 |
| 197.211.238.220 | attackbotsspam | Dovecot Invalid User Login Attempt. |
2020-07-25 01:50:18 |
| 193.35.48.18 | attack | Jul 24 19:08:24 srv01 postfix/smtpd\[6884\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 19:08:45 srv01 postfix/smtpd\[8283\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 19:09:11 srv01 postfix/smtpd\[1317\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 19:09:34 srv01 postfix/smtpd\[3379\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 19:16:55 srv01 postfix/smtpd\[1317\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-25 01:19:10 |
| 59.95.96.27 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-07-25 01:16:33 |
| 62.210.194.8 | attack | Jul 24 18:32:46 mail.srvfarm.net postfix/smtpd[2393350]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] Jul 24 18:33:52 mail.srvfarm.net postfix/smtpd[2393350]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] Jul 24 18:34:56 mail.srvfarm.net postfix/smtpd[2395965]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] Jul 24 18:37:08 mail.srvfarm.net postfix/smtpd[2395916]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] Jul 24 18:38:10 mail.srvfarm.net postfix/smtpd[2396237]: lost connection after STARTTLS from r8.news.eu.rvca.com[62.210.194.8] |
2020-07-25 01:32:09 |
| 2a03:b0c0:3:e0::33c:b001 | attack | 2a03:b0c0:3:e0::33c:b001 - - [24/Jul/2020:14:45:44 +0100] "POST /wp-login.php HTTP/1.1" 200 2433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 2a03:b0c0:3:e0::33c:b001 - - [24/Jul/2020:14:45:45 +0100] "POST /wp-login.php HTTP/1.1" 200 2399 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 2a03:b0c0:3:e0::33c:b001 - - [24/Jul/2020:14:45:55 +0100] "POST /wp-login.php HTTP/1.1" 200 2352 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-25 01:49:03 |
| 117.239.217.46 | attackspam | Unauthorized connection attempt from IP address 117.239.217.46 on Port 445(SMB) |
2020-07-25 01:17:39 |
| 123.27.138.206 | attackspambots | Honeypot attack, port: 445, PTR: localhost. |
2020-07-25 01:26:03 |
| 185.165.178.238 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-07-25 01:48:11 |
| 77.45.86.90 | attackspam | Jul 24 16:28:36 mail.srvfarm.net postfix/smtpd[2325929]: warning: 77-45-86-90.sta.asta-net.com.pl[77.45.86.90]: SASL PLAIN authentication failed: Jul 24 16:28:36 mail.srvfarm.net postfix/smtpd[2325929]: lost connection after AUTH from 77-45-86-90.sta.asta-net.com.pl[77.45.86.90] Jul 24 16:30:44 mail.srvfarm.net postfix/smtps/smtpd[2329970]: warning: 77-45-86-90.sta.asta-net.com.pl[77.45.86.90]: SASL PLAIN authentication failed: Jul 24 16:30:45 mail.srvfarm.net postfix/smtps/smtpd[2329970]: lost connection after AUTH from 77-45-86-90.sta.asta-net.com.pl[77.45.86.90] Jul 24 16:34:20 mail.srvfarm.net postfix/smtps/smtpd[2329970]: warning: 77-45-86-90.sta.asta-net.com.pl[77.45.86.90]: SASL PLAIN authentication failed: |
2020-07-25 01:31:19 |
| 20.37.241.243 | attackbots | Jul 24 19:26:58 mail.srvfarm.net postfix/smtps/smtpd[6175]: warning: unknown[20.37.241.243]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 19:29:18 mail.srvfarm.net postfix/smtps/smtpd[8440]: warning: unknown[20.37.241.243]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 19:31:38 mail.srvfarm.net postfix/smtps/smtpd[8385]: warning: unknown[20.37.241.243]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 19:33:56 mail.srvfarm.net postfix/smtps/smtpd[6250]: warning: unknown[20.37.241.243]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 24 19:36:16 mail.srvfarm.net postfix/smtps/smtpd[8445]: warning: unknown[20.37.241.243]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-07-25 01:46:33 |