城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.44.142.187 | attack | Apr 7 23:45:53 novum-srv2 sshd[3649]: Invalid user root-db from 142.44.142.187 port 47262 Apr 7 23:46:32 novum-srv2 sshd[3669]: Invalid user Andromeda from 142.44.142.187 port 51708 Apr 7 23:47:11 novum-srv2 sshd[3689]: Invalid user Andromeda from 142.44.142.187 port 56120 ... |
2020-04-08 06:17:07 |
| 142.44.142.187 | attackbotsspam | 2020-04-06T16:10:20.014737abusebot-5.cloudsearch.cf sshd[31186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns551371.ip-142-44-142.net user=root 2020-04-06T16:10:22.106763abusebot-5.cloudsearch.cf sshd[31186]: Failed password for root from 142.44.142.187 port 59698 ssh2 2020-04-06T16:10:21.139452abusebot-5.cloudsearch.cf sshd[31188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns551371.ip-142-44-142.net user=root 2020-04-06T16:10:23.506166abusebot-5.cloudsearch.cf sshd[31188]: Failed password for root from 142.44.142.187 port 36476 ssh2 2020-04-06T16:10:23.547353abusebot-5.cloudsearch.cf sshd[31190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns551371.ip-142-44-142.net user=root 2020-04-06T16:10:25.522925abusebot-5.cloudsearch.cf sshd[31190]: Failed password for root from 142.44.142.187 port 41488 ssh2 2020-04-06T16:10:25.781148abusebot-5.cloudsearch. ... |
2020-04-07 03:01:11 |
| 142.44.142.226 | attackspam | " " |
2020-02-05 03:04:05 |
| 142.44.142.24 | attackspam | [portscan] tcp/3389 [MS RDP] *(RWIN=1024)(01311214) |
2020-01-31 18:36:13 |
| 142.44.142.24 | attack | Honeypot hit. |
2019-11-15 16:53:56 |
| 142.44.142.15 | attackspam | Oct 6 05:55:20 MK-Soft-Root1 sshd[17380]: Failed password for bin from 142.44.142.15 port 49344 ssh2 Oct 6 05:55:20 MK-Soft-Root1 sshd[17382]: Failed password for daemon from 142.44.142.15 port 49382 ssh2 ... |
2019-10-06 12:11:33 |
| 142.44.142.136 | attack | Brute forcing Wordpress login |
2019-08-13 12:41:03 |
| 142.44.142.24 | attackspam | CloudCIX Reconnaissance Scan Detected, PTR: ns548039.ip-142-44-142.net. |
2019-07-15 09:14:17 |
| 142.44.142.136 | attack | ft-1848-fussball.de 142.44.142.136 \[13/Jul/2019:17:16:53 +0200\] "POST /wp-login.php HTTP/1.1" 200 2313 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ft-1848-fussball.de 142.44.142.136 \[13/Jul/2019:17:16:54 +0200\] "POST /wp-login.php HTTP/1.1" 200 2278 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ft-1848-fussball.de 142.44.142.136 \[13/Jul/2019:17:16:55 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 514 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-07-13 23:37:54 |
| 142.44.142.187 | attackspambots | 2019-07-06T17:52:26.740914enmeeting.mahidol.ac.th sshd\[9820\]: Invalid user vps from 142.44.142.187 port 36134 2019-07-06T17:52:26.760846enmeeting.mahidol.ac.th sshd\[9820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns551371.ip-142-44-142.net 2019-07-06T17:52:29.223421enmeeting.mahidol.ac.th sshd\[9820\]: Failed password for invalid user vps from 142.44.142.187 port 36134 ssh2 ... |
2019-07-06 19:10:14 |
| 142.44.142.187 | attackspam | 2019-07-03T12:08:26.351480WS-Zach sshd[1954]: Invalid user nagios from 142.44.142.187 port 37076 2019-07-03T12:08:26.355167WS-Zach sshd[1954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.142.187 2019-07-03T12:08:26.351480WS-Zach sshd[1954]: Invalid user nagios from 142.44.142.187 port 37076 2019-07-03T12:08:28.440836WS-Zach sshd[1954]: Failed password for invalid user nagios from 142.44.142.187 port 37076 ssh2 2019-07-03T12:11:10.648582WS-Zach sshd[3403]: Invalid user albert from 142.44.142.187 port 38726 ... |
2019-07-04 01:22:34 |
| 142.44.142.187 | attackbots | Triggered by Fail2Ban at Ares web server |
2019-06-26 00:51:51 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.44.142.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.44.142.171. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:04:44 CST 2022
;; MSG SIZE rcvd: 107
171.142.44.142.in-addr.arpa domain name pointer mc32-005.ph-infra.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
171.142.44.142.in-addr.arpa name = mc32-005.ph-infra.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 221.203.10.154 | attack | Unauthorized connection attempt detected from IP address 221.203.10.154 to port 1433 |
2020-05-29 22:57:32 |
| 183.171.226.245 | attack | Unauthorized connection attempt detected from IP address 183.171.226.245 to port 445 |
2020-05-29 23:10:36 |
| 178.93.32.18 | attackspam | Unauthorized connection attempt detected from IP address 178.93.32.18 to port 80 |
2020-05-29 23:13:40 |
| 110.191.244.163 | attackspam | Unauthorized connection attempt detected from IP address 110.191.244.163 to port 445 |
2020-05-29 23:23:03 |
| 187.148.102.134 | attackspam | Unauthorized connection attempt detected from IP address 187.148.102.134 to port 81 |
2020-05-29 23:08:11 |
| 112.255.53.42 | attackbotsspam | Unauthorized connection attempt detected from IP address 112.255.53.42 to port 23 |
2020-05-29 23:22:02 |
| 198.108.67.22 | attackspam | Port Scan |
2020-05-29 23:02:49 |
| 134.209.95.125 | attackspambots | Port Scan |
2020-05-29 23:17:37 |
| 82.222.61.135 | spam | SPAM E-Mail received from this IP Address |
2020-05-29 23:24:06 |
| 106.12.69.90 | attack | May 29 15:01:15 debian-2gb-nbg1-2 kernel: \[13016060.373010\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=106.12.69.90 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=14126 PROTO=TCP SPT=48412 DPT=16214 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-29 23:23:47 |
| 114.40.249.48 | attackbots | Port Scan |
2020-05-29 23:21:22 |
| 111.229.239.203 | attack | Unauthorized connection attempt detected from IP address 111.229.239.203 to port 8080 |
2020-05-29 23:22:28 |
| 189.26.23.177 | attackbotsspam | Unauthorized connection attempt detected from IP address 189.26.23.177 to port 23 |
2020-05-29 23:05:41 |
| 193.111.79.81 | spam | Huge amount of SPAM E-Mail received from this IP Address |
2020-05-29 23:22:39 |
| 88.248.102.129 | attackbotsspam | Unauthorized connection attempt detected from IP address 88.248.102.129 to port 9530 |
2020-05-29 23:28:31 |