城市(city): North Bergen
省份(region): New Jersey
国家(country): United States
运营商(isp): DigitalOcean LLC
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Data Center/Web Hosting/Transit
类型 | 评论内容 | 时间 |
---|---|---|
attackspam | Oct 9 23:04:39 b-vps wordpress(www.gpfans.cz)[22349]: Authentication attempt for unknown user buchtic from 142.93.122.207 ... |
2020-10-10 06:03:12 |
attackspam | Automatically reported by fail2ban report script (mx1) |
2020-10-09 22:09:03 |
attack | Automatic report - Banned IP Access |
2020-10-09 13:59:24 |
attack | Automatic report - Banned IP Access |
2020-10-05 08:05:38 |
attackbots | 142.93.122.207 - - [04/Oct/2020:18:20:02 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:08 +0200] "POST /wp-login.php HTTP/1.1" 200 2104 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:13 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:14 +0200] "POST /wp-login.php HTTP/1.1" 200 2090 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:19 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:20 +0200] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001 ... |
2020-10-05 00:28:37 |
attack | Oct 4 09:05:47 wordpress wordpress(www.ruhnke.cloud)[71192]: Blocked authentication attempt for admin from 142.93.122.207 |
2020-10-04 16:11:30 |
attack | CMS (WordPress or Joomla) login attempt. |
2020-09-25 09:32:13 |
attackbotsspam | 142.93.122.207 - - [31/Aug/2020:13:33:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1908 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [31/Aug/2020:13:33:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [31/Aug/2020:13:33:28 +0100] "POST /wp-login.php HTTP/1.1" 200 1845 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-01 00:36:33 |
attack | 142.93.122.207 - - [14/Aug/2020:08:46:51 +0200] "GET /wp-login.php HTTP/1.1" 200 9155 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [14/Aug/2020:08:46:58 +0200] "POST /wp-login.php HTTP/1.1" 200 9406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [14/Aug/2020:08:47:04 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-14 15:07:08 |
attackbots | WordPress login Brute force / Web App Attack on client site. |
2020-08-10 04:40:15 |
attackbots | 142.93.122.207 - - \[09/Aug/2020:06:30:15 +0200\] "POST /wp-login.php HTTP/1.0" 200 5983 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - \[09/Aug/2020:06:30:27 +0200\] "POST /wp-login.php HTTP/1.0" 200 5981 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - \[09/Aug/2020:06:30:28 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-08-09 17:23:56 |
attackbots | 142.93.122.207 - - [04/Aug/2020:13:11:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2420 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Aug/2020:13:11:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Aug/2020:13:11:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2425 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-05 00:45:23 |
attackspam | WordPress wp-login brute force :: 142.93.122.207 0.068 BYPASS [02/Aug/2020:17:12:40 0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2003 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-03 02:48:18 |
attackbots | XMLRPC attack |
2020-07-30 23:39:07 |
attack | xmlrpc attack |
2020-07-30 17:53:36 |
attack | /admin/ |
2020-07-27 18:32:17 |
attackbotsspam | 142.93.122.207 - - [29/Jun/2020:13:14:39 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [29/Jun/2020:13:14:40 +0200] "POST /wp-login.php HTTP/1.1" 200 3412 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-06-29 19:16:39 |
attack | Automatic report - XMLRPC Attack |
2020-06-19 07:09:01 |
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
142.93.122.58 | attackspam | Oct 14 01:26:40 *host* sshd\[5445\]: Invalid user minecraft from 142.93.122.58 port 53172 |
2020-10-14 07:55:07 |
142.93.122.161 | attack | 142.93.122.161 - - [05/Sep/2020:19:59:24 +0100] "POST /wp-login.php HTTP/1.1" 200 2178 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [05/Sep/2020:19:59:26 +0100] "POST /wp-login.php HTTP/1.1" 200 2154 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [05/Sep/2020:19:59:26 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-06 03:23:14 |
142.93.122.161 | attackbotsspam | 142.93.122.161 - - [05/Sep/2020:10:19:29 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [05/Sep/2020:10:19:30 +0100] "POST /wp-login.php HTTP/1.1" 200 2000 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [05/Sep/2020:10:19:30 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-05 18:58:57 |
142.93.122.161 | attackspambots | 142.93.122.161 - - [04/Sep/2020:19:08:15 +0000] "GET /wp-login.php HTTP/1.1" 403 154 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-09-05 03:39:19 |
142.93.122.161 | attack | 142.93.122.161 - - [04/Sep/2020:11:18:48 +0100] "POST /wp-login.php HTTP/1.1" 200 2261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [04/Sep/2020:11:18:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2210 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [04/Sep/2020:11:18:51 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-04 19:08:05 |
142.93.122.161 | attackspambots | 142.93.122.161 - - \[31/Aug/2020:01:07:04 +0200\] "POST /wp-login.php HTTP/1.0" 200 2797 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - \[31/Aug/2020:01:07:05 +0200\] "POST /wp-login.php HTTP/1.0" 200 2724 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - \[31/Aug/2020:01:07:07 +0200\] "POST /wp-login.php HTTP/1.0" 200 2762 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-08-31 09:07:15 |
142.93.122.161 | attackspam | 142.93.122.161 - - [29/Aug/2020:06:51:39 +0100] "POST /wp-login.php HTTP/1.1" 200 2606 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [29/Aug/2020:06:51:40 +0100] "POST /wp-login.php HTTP/1.1" 200 2581 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [29/Aug/2020:06:51:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2581 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-29 16:07:57 |
142.93.122.161 | attackspam | 142.93.122.161 - - [24/Aug/2020:01:15:56 +0200] "GET /wp-login.php HTTP/1.1" 200 8691 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [24/Aug/2020:01:15:58 +0200] "POST /wp-login.php HTTP/1.1" 200 8975 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [24/Aug/2020:01:15:59 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-24 09:36:07 |
142.93.122.161 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-08-18 22:28:40 |
142.93.122.161 | attackbots | 142.93.122.161 - - [16/Aug/2020:15:11:12 +0200] "GET /wp-login.php HTTP/1.1" 200 8691 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [16/Aug/2020:15:11:14 +0200] "POST /wp-login.php HTTP/1.1" 200 8921 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.161 - - [16/Aug/2020:15:11:15 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-16 23:36:34 |
142.93.122.161 | attack | xmlrpc attack |
2020-08-16 13:49:12 |
142.93.122.161 | attackspambots | Automatic report - XMLRPC Attack |
2020-08-05 19:46:51 |
142.93.122.58 | attackbotsspam | SSH Brute-Force Attack |
2020-04-06 20:24:37 |
142.93.122.58 | attack | Bruteforce detected by fail2ban |
2020-04-06 06:18:00 |
142.93.122.58 | attackbotsspam | Mar 29 00:17:05 v22018053744266470 sshd[7672]: Failed password for root from 142.93.122.58 port 48464 ssh2 Mar 29 00:18:44 v22018053744266470 sshd[7786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.122.58 Mar 29 00:18:45 v22018053744266470 sshd[7786]: Failed password for invalid user cacti from 142.93.122.58 port 34230 ssh2 ... |
2020-03-29 08:51:30 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.122.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55840
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.122.207. IN A
;; AUTHORITY SECTION:
. 449 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020061801 1800 900 604800 86400
;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 19 07:08:58 CST 2020
;; MSG SIZE rcvd: 118
Host 207.122.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 207.122.93.142.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
45.124.6.241 | attackbots | Unauthorized connection attempt from IP address 45.124.6.241 on Port 445(SMB) |
2019-09-13 19:29:58 |
109.194.16.10 | attack | Unauthorized connection attempt from IP address 109.194.16.10 on Port 445(SMB) |
2019-09-13 19:43:59 |
183.81.66.60 | attack | Unauthorized connection attempt from IP address 183.81.66.60 on Port 445(SMB) |
2019-09-13 18:57:46 |
78.194.214.19 | attackspambots | Invalid user f from 78.194.214.19 port 35550 |
2019-09-13 19:09:43 |
139.59.95.121 | attack | Automatic report - Banned IP Access |
2019-09-13 19:10:59 |
41.64.20.10 | attackspambots | Unauthorized connection attempt from IP address 41.64.20.10 on Port 445(SMB) |
2019-09-13 19:10:01 |
36.233.96.182 | attackspambots | Unauthorized connection attempt from IP address 36.233.96.182 on Port 445(SMB) |
2019-09-13 18:52:39 |
167.114.251.164 | attackspam | SSH Brute Force, server-1 sshd[725]: Failed password for invalid user user1 from 167.114.251.164 port 35185 ssh2 |
2019-09-13 19:14:21 |
85.105.74.194 | attack | Unauthorized connection attempt from IP address 85.105.74.194 on Port 445(SMB) |
2019-09-13 19:40:52 |
112.85.42.227 | attackbotsspam | Sep 13 07:20:15 TORMINT sshd\[14411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227 user=root Sep 13 07:20:17 TORMINT sshd\[14411\]: Failed password for root from 112.85.42.227 port 56974 ssh2 Sep 13 07:20:20 TORMINT sshd\[14411\]: Failed password for root from 112.85.42.227 port 56974 ssh2 ... |
2019-09-13 19:36:49 |
223.16.216.92 | attackbotsspam | 2019-08-19 19:44:42,078 fail2ban.actions [878]: NOTICE [sshd] Ban 223.16.216.92 2019-08-19 22:52:29,449 fail2ban.actions [878]: NOTICE [sshd] Ban 223.16.216.92 2019-08-20 01:59:38,487 fail2ban.actions [878]: NOTICE [sshd] Ban 223.16.216.92 ... |
2019-09-13 19:18:10 |
112.164.48.84 | attackbots | 2019-09-13T03:46:34.824342abusebot-3.cloudsearch.cf sshd\[2095\]: Invalid user tomas from 112.164.48.84 port 34498 |
2019-09-13 19:15:56 |
206.189.149.170 | attack | SSH Brute Force, server-1 sshd[15447]: Failed password for invalid user ftpuser from 206.189.149.170 port 45252 ssh2 |
2019-09-13 19:12:19 |
219.139.78.67 | attackspam | Unauthorized SSH login attempts |
2019-09-13 19:31:50 |
51.255.35.58 | attack | Sep 13 13:16:44 mail sshd\[29513\]: Invalid user teste from 51.255.35.58 port 49326 Sep 13 13:16:44 mail sshd\[29513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.58 Sep 13 13:16:47 mail sshd\[29513\]: Failed password for invalid user teste from 51.255.35.58 port 49326 ssh2 Sep 13 13:20:21 mail sshd\[29886\]: Invalid user ftpuser from 51.255.35.58 port 44123 Sep 13 13:20:21 mail sshd\[29886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.58 |
2019-09-13 19:31:04 |