城市(city): Xinpu
省份(region): Jiangsu
国家(country): China
运营商(isp): ChinaNet Jiangsu Province Network
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attack | SpamScore above: 10.0 |
2020-06-24 06:47:32 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 114.237.134.228 | attack | SpamScore above: 10.0 |
2020-06-16 23:23:53 |
| 114.237.134.193 | attack | SpamScore above: 10.0 |
2020-06-03 17:04:00 |
| 114.237.134.66 | attack | IP: 114.237.134.66
Ports affected
Simple Mail Transfer (25)
Found in DNSBL('s)
ASN Details
AS4134 Chinanet
China (CN)
CIDR 114.232.0.0/13
Log Date: 9/05/2020 7:57:01 PM UTC |
2020-05-10 05:47:37 |
| 114.237.134.84 | attack | SpamScore above: 10.0 |
2020-04-06 16:42:09 |
| 114.237.134.133 | attackbots | Feb 24 05:53:02 grey postfix/smtpd\[5539\]: NOQUEUE: reject: RCPT from unknown\[114.237.134.133\]: 554 5.7.1 Service unavailable\; Client host \[114.237.134.133\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=114.237.134.133\; from=\ |
2020-02-24 16:10:39 |
| 114.237.134.194 | attackbotsspam | Jan 23 17:06:17 grey postfix/smtpd\[7664\]: NOQUEUE: reject: RCPT from unknown\[114.237.134.194\]: 554 5.7.1 Service unavailable\; Client host \[114.237.134.194\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[114.237.134.194\]\; from=\ |
2020-01-24 03:26:02 |
| 114.237.134.79 | attackspambots | Dec 28 07:23:19 grey postfix/smtpd\[4905\]: NOQUEUE: reject: RCPT from unknown\[114.237.134.79\]: 554 5.7.1 Service unavailable\; Client host \[114.237.134.79\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[114.237.134.79\]\; from=\ |
2019-12-28 19:24:09 |
| 114.237.134.247 | attackspam | Dec 27 07:16:13 mxgate1 postfix/postscreen[21363]: CONNECT from [114.237.134.247]:10130 to [176.31.12.44]:25 Dec 27 07:16:13 mxgate1 postfix/dnsblog[21364]: addr 114.237.134.247 listed by domain zen.spamhaus.org as 127.0.0.4 Dec 27 07:16:13 mxgate1 postfix/dnsblog[21364]: addr 114.237.134.247 listed by domain zen.spamhaus.org as 127.0.0.11 Dec 27 07:16:13 mxgate1 postfix/dnsblog[21377]: addr 114.237.134.247 listed by domain cbl.abuseat.org as 127.0.0.2 Dec 27 07:16:13 mxgate1 postfix/dnsblog[21366]: addr 114.237.134.247 listed by domain b.barracudacentral.org as 127.0.0.2 Dec 27 07:16:19 mxgate1 postfix/postscreen[21363]: DNSBL rank 4 for [114.237.134.247]:10130 Dec x@x Dec 27 07:16:20 mxgate1 postfix/postscreen[21363]: DISCONNECT [114.237.134.247]:10130 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=114.237.134.247 |
2019-12-27 16:06:42 |
| 114.237.134.103 | attack | SpamReport |
2019-12-12 14:56:45 |
| 114.237.134.221 | attack | Oct 16 22:23:14 elektron postfix/smtpd\[28644\]: NOQUEUE: reject: RCPT from unknown\[114.237.134.221\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[114.237.134.221\]\; from=\ |
2019-10-17 07:16:24 |
| 114.237.134.176 | attackspambots | Brute force SMTP login attempts. |
2019-09-10 02:00:07 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.237.134.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.237.134.204. IN A
;; AUTHORITY SECTION:
. 431 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020062301 1800 900 604800 86400
;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 24 06:47:29 CST 2020
;; MSG SIZE rcvd: 119
204.134.237.114.in-addr.arpa domain name pointer 204.134.237.114.broad.lyg.js.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
204.134.237.114.in-addr.arpa name = 204.134.237.114.broad.lyg.js.dynamic.163data.com.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.75.108.218 | attackspambots | (sshd) Failed SSH login from 106.75.108.218 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 3 23:04:44 amsweb01 sshd[315]: Invalid user wp-user from 106.75.108.218 port 46473 Mar 3 23:04:46 amsweb01 sshd[315]: Failed password for invalid user wp-user from 106.75.108.218 port 46473 ssh2 Mar 3 23:06:57 amsweb01 sshd[769]: Invalid user sftpuser from 106.75.108.218 port 36644 Mar 3 23:06:59 amsweb01 sshd[769]: Failed password for invalid user sftpuser from 106.75.108.218 port 36644 ssh2 Mar 3 23:09:08 amsweb01 sshd[1369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.108.218 user=root |
2020-03-04 07:39:26 |
| 54.38.242.206 | attackbots | Mar 4 00:04:29 ns382633 sshd\[11021\]: Invalid user trung from 54.38.242.206 port 60740 Mar 4 00:04:29 ns382633 sshd\[11021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.206 Mar 4 00:04:31 ns382633 sshd\[11021\]: Failed password for invalid user trung from 54.38.242.206 port 60740 ssh2 Mar 4 00:31:16 ns382633 sshd\[16507\]: Invalid user gitlab-psql from 54.38.242.206 port 42606 Mar 4 00:31:16 ns382633 sshd\[16507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.206 |
2020-03-04 07:35:22 |
| 45.55.219.114 | attackspam | (sshd) Failed SSH login from 45.55.219.114 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 4 00:15:24 amsweb01 sshd[17920]: Invalid user liferay from 45.55.219.114 port 46162 Mar 4 00:15:26 amsweb01 sshd[17920]: Failed password for invalid user liferay from 45.55.219.114 port 46162 ssh2 Mar 4 00:17:57 amsweb01 sshd[18438]: Invalid user sql from 45.55.219.114 port 49222 Mar 4 00:17:59 amsweb01 sshd[18438]: Failed password for invalid user sql from 45.55.219.114 port 49222 ssh2 Mar 4 00:20:25 amsweb01 sshd[18947]: Invalid user rr from 45.55.219.114 port 52286 |
2020-03-04 07:30:15 |
| 86.120.41.45 | attackbots | Telnetd brute force attack detected by fail2ban |
2020-03-04 07:35:46 |
| 45.55.182.232 | attackbots | 2020-03-03T23:07:50.871395shield sshd\[25721\]: Invalid user liupeng from 45.55.182.232 port 60816 2020-03-03T23:07:50.878650shield sshd\[25721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.koan.co.nz 2020-03-03T23:07:53.068289shield sshd\[25721\]: Failed password for invalid user liupeng from 45.55.182.232 port 60816 ssh2 2020-03-03T23:10:10.864249shield sshd\[26176\]: Invalid user frappe from 45.55.182.232 port 35512 2020-03-03T23:10:10.868945shield sshd\[26176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.koan.co.nz |
2020-03-04 07:19:30 |
| 138.197.148.135 | attackspam | Detected by Fail2Ban |
2020-03-04 07:28:27 |
| 159.203.82.179 | attackspam | Mar 4 00:20:46 localhost sshd\[28448\]: Invalid user kristofvps from 159.203.82.179 port 57916 Mar 4 00:20:46 localhost sshd\[28448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.82.179 Mar 4 00:20:49 localhost sshd\[28448\]: Failed password for invalid user kristofvps from 159.203.82.179 port 57916 ssh2 |
2020-03-04 07:34:52 |
| 222.186.175.154 | attack | Mar 3 23:45:14 localhost sshd[125976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Mar 3 23:45:17 localhost sshd[125976]: Failed password for root from 222.186.175.154 port 17922 ssh2 Mar 3 23:45:20 localhost sshd[125976]: Failed password for root from 222.186.175.154 port 17922 ssh2 Mar 3 23:45:14 localhost sshd[125976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Mar 3 23:45:17 localhost sshd[125976]: Failed password for root from 222.186.175.154 port 17922 ssh2 Mar 3 23:45:20 localhost sshd[125976]: Failed password for root from 222.186.175.154 port 17922 ssh2 Mar 3 23:45:14 localhost sshd[125976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Mar 3 23:45:17 localhost sshd[125976]: Failed password for root from 222.186.175.154 port 17922 ssh2 Mar 3 23:45:20 localhost ... |
2020-03-04 07:50:50 |
| 201.73.143.60 | attack | Mar 4 00:30:31 vps647732 sshd[10780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.73.143.60 Mar 4 00:30:33 vps647732 sshd[10780]: Failed password for invalid user bitbucket from 201.73.143.60 port 51292 ssh2 ... |
2020-03-04 07:41:08 |
| 115.236.168.35 | attackbotsspam | 20 attempts against mh-ssh on echoip |
2020-03-04 07:52:03 |
| 192.241.218.70 | attackbotsspam | port scan and connect, tcp 3128 (squid-http) |
2020-03-04 07:51:19 |
| 157.245.112.238 | attack | Mar 4 00:42:23 ns3042688 sshd\[31613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.112.238 user=root Mar 4 00:42:25 ns3042688 sshd\[31613\]: Failed password for root from 157.245.112.238 port 43178 ssh2 Mar 4 00:42:26 ns3042688 sshd\[31616\]: Invalid user admin from 157.245.112.238 Mar 4 00:42:26 ns3042688 sshd\[31616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.112.238 Mar 4 00:42:28 ns3042688 sshd\[31616\]: Failed password for invalid user admin from 157.245.112.238 port 46394 ssh2 ... |
2020-03-04 07:42:40 |
| 181.30.28.59 | attackspam | SASL PLAIN auth failed: ruser=... |
2020-03-04 07:13:08 |
| 51.77.220.127 | attackbotsspam | 51.77.220.127 - - [04/Mar/2020:03:05:42 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ... |
2020-03-04 07:26:28 |
| 120.70.100.88 | attack | Mar 3 19:06:36 firewall sshd[13883]: Invalid user gameserver from 120.70.100.88 Mar 3 19:06:38 firewall sshd[13883]: Failed password for invalid user gameserver from 120.70.100.88 port 39920 ssh2 Mar 3 19:15:45 firewall sshd[14251]: Invalid user nfsnobody from 120.70.100.88 ... |
2020-03-04 07:15:35 |