城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): DigitalOcean LLC
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Data Center/Web Hosting/Transit
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attackspambots | Banned for a week because repeated abuses, for example SSH, but not only |
2020-10-08 01:01:05 |
| attack | Oct 7 11:36:29 root sshd[417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.2 user=root Oct 7 11:36:32 root sshd[417]: Failed password for root from 142.93.101.2 port 49244 ssh2 ... |
2020-10-07 17:09:59 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.101.46 | attack | TCP port : 11535 |
2020-09-21 20:15:34 |
| 142.93.101.46 | attack | $f2bV_matches |
2020-09-21 12:07:29 |
| 142.93.101.46 | attack | Port scan denied |
2020-09-21 03:58:10 |
| 142.93.101.46 | attack | Sep 19 15:43:29 nextcloud sshd\[13636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.46 user=root Sep 19 15:43:31 nextcloud sshd\[13636\]: Failed password for root from 142.93.101.46 port 40324 ssh2 Sep 19 15:59:11 nextcloud sshd\[30368\]: Invalid user user123 from 142.93.101.46 Sep 19 15:59:11 nextcloud sshd\[30368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.46 |
2020-09-19 22:00:31 |
| 142.93.101.46 | attackspam | 11777/tcp 30023/tcp 23124/tcp... [2020-08-30/09-18]65pkt,22pt.(tcp) |
2020-09-19 13:53:09 |
| 142.93.101.46 | attackbotsspam | fail2ban detected bruce force on ssh iptables |
2020-09-19 05:32:24 |
| 142.93.101.46 | attack | Invalid user weblogic from 142.93.101.46 port 35024 |
2020-09-17 06:30:38 |
| 142.93.101.46 | attackbotsspam | 2020-09-14T14:37:49+0000 Failed SSH Authentication/Brute Force Attack. (Server 6) |
2020-09-15 00:50:55 |
| 142.93.101.46 | attack | Sep 14 09:46:15 v22019038103785759 sshd\[8351\]: Invalid user vodafone from 142.93.101.46 port 51558 Sep 14 09:46:15 v22019038103785759 sshd\[8351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.46 Sep 14 09:46:17 v22019038103785759 sshd\[8351\]: Failed password for invalid user vodafone from 142.93.101.46 port 51558 ssh2 Sep 14 09:55:29 v22019038103785759 sshd\[9157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.46 user=root Sep 14 09:55:31 v22019038103785759 sshd\[9157\]: Failed password for root from 142.93.101.46 port 60406 ssh2 ... |
2020-09-14 16:34:32 |
| 142.93.101.148 | attack | detected by Fail2Ban |
2020-09-12 23:39:39 |
| 142.93.101.148 | attack | (sshd) Failed SSH login from 142.93.101.148 (DE/Germany/-): 5 in the last 3600 secs |
2020-09-12 15:43:02 |
| 142.93.101.148 | attack | Sep 12 00:25:35 sshgateway sshd\[10111\]: Invalid user oneadmin from 142.93.101.148 Sep 12 00:25:35 sshgateway sshd\[10111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148 Sep 12 00:25:37 sshgateway sshd\[10111\]: Failed password for invalid user oneadmin from 142.93.101.148 port 41276 ssh2 |
2020-09-12 07:29:58 |
| 142.93.101.21 | attackspam | Sep 1 11:28:50 webhost01 sshd[2657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.21 Sep 1 11:28:51 webhost01 sshd[2657]: Failed password for invalid user amber from 142.93.101.21 port 40062 ssh2 ... |
2020-09-01 12:29:27 |
| 142.93.101.21 | attackbots | Aug 29 08:03:23 george sshd[22808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.21 Aug 29 08:03:25 george sshd[22808]: Failed password for invalid user user1 from 142.93.101.21 port 58914 ssh2 Aug 29 08:09:05 george sshd[22937]: Invalid user juan from 142.93.101.21 port 40464 Aug 29 08:09:05 george sshd[22937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.21 Aug 29 08:09:06 george sshd[22937]: Failed password for invalid user juan from 142.93.101.21 port 40464 ssh2 ... |
2020-08-29 23:32:11 |
| 142.93.101.46 | attackbotsspam | Aug 28 19:17:24 minden010 sshd[22457]: Failed password for mysql from 142.93.101.46 port 49918 ssh2 Aug 28 19:21:12 minden010 sshd[23829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.46 Aug 28 19:21:14 minden010 sshd[23829]: Failed password for invalid user sysop from 142.93.101.46 port 58718 ssh2 ... |
2020-08-29 03:24:50 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.101.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.101.2. IN A
;; AUTHORITY SECTION:
. 158 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020100700 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 07 17:09:55 CST 2020
;; MSG SIZE rcvd: 116
Host 2.101.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 2.101.93.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 36.90.49.170 | attackbots | unauthorized connection attempt |
2020-01-07 15:48:08 |
| 162.243.165.39 | attack | Jan 7 08:15:23 icinga sshd[29271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.165.39 Jan 7 08:15:25 icinga sshd[29271]: Failed password for invalid user guf from 162.243.165.39 port 57878 ssh2 ... |
2020-01-07 15:33:18 |
| 108.208.113.253 | attackbotsspam | Unauthorized connection attempt detected from IP address 108.208.113.253 to port 81 [J] |
2020-01-07 15:37:58 |
| 178.129.146.216 | attackbots | Unauthorized connection attempt detected from IP address 178.129.146.216 to port 23 [J] |
2020-01-07 15:30:11 |
| 122.51.179.14 | attackspam | Unauthorized connection attempt detected from IP address 122.51.179.14 to port 2220 [J] |
2020-01-07 15:36:35 |
| 165.227.93.39 | attack | Jan 7 08:04:53 sxvn sshd[315864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.93.39 |
2020-01-07 15:32:45 |
| 1.52.156.208 | attackbotsspam | unauthorized connection attempt |
2020-01-07 15:50:39 |
| 112.30.185.8 | attackspam | Unauthorized connection attempt detected from IP address 112.30.185.8 to port 2220 [J] |
2020-01-07 15:09:56 |
| 148.72.210.28 | attackspam | Unauthorized connection attempt detected from IP address 148.72.210.28 to port 2220 [J] |
2020-01-07 15:34:04 |
| 190.140.236.228 | attackbotsspam | Unauthorized connection attempt detected from IP address 190.140.236.228 to port 23 [J] |
2020-01-07 15:28:10 |
| 77.228.48.23 | attack | unauthorized connection attempt |
2020-01-07 15:17:54 |
| 42.116.227.99 | attack | Unauthorized connection attempt detected from IP address 42.116.227.99 to port 23 [J] |
2020-01-07 15:21:27 |
| 79.164.235.8 | attackspambots | Unauthorized connection attempt detected from IP address 79.164.235.8 to port 5555 [J] |
2020-01-07 15:43:25 |
| 45.237.140.120 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.237.140.120 to port 2220 [J] |
2020-01-07 15:47:00 |
| 200.25.254.161 | attack | Unauthorized connection attempt detected from IP address 200.25.254.161 to port 23 [J] |
2020-01-07 15:25:24 |