城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.149.57 | attack |
|
2020-08-28 16:17:34 |
| 142.93.149.57 | attack | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: do-prod-us-north-clients-0106-9.do.binaryedge.ninja. |
2020-08-11 08:50:11 |
| 142.93.149.226 | attackspambots | Unauthorised access (Mar 5) SRC=142.93.149.226 LEN=40 TTL=48 ID=9153 TCP DPT=8080 WINDOW=17229 SYN Unauthorised access (Mar 4) SRC=142.93.149.226 LEN=40 TTL=48 ID=10114 TCP DPT=8080 WINDOW=17229 SYN Unauthorised access (Mar 3) SRC=142.93.149.226 LEN=40 TTL=48 ID=15698 TCP DPT=8080 WINDOW=4314 SYN |
2020-03-06 01:41:55 |
| 142.93.149.226 | attack | Unauthorized connection attempt detected from IP address 142.93.149.226 to port 23 [J] |
2020-03-02 17:39:50 |
| 142.93.149.34 | attackbots | WordPress login Brute force / Web App Attack on client site. |
2019-10-17 19:19:24 |
| 142.93.149.34 | attackbots | 142.93.149.34 - - [02/Oct/2019:18:41:06 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.149.34 - - [02/Oct/2019:18:41:08 +0200] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.149.34 - - [02/Oct/2019:18:41:09 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.149.34 - - [02/Oct/2019:18:41:10 +0200] "POST /wp-login.php HTTP/1.1" 200 1684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.149.34 - - [02/Oct/2019:18:41:13 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.149.34 - - [02/Oct/2019:18:41:13 +0200] "POST /wp-login.php HTTP/1.1" 200 1688 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-10-03 04:18:13 |
| 142.93.149.34 | attackspambots | ft-1848-basketball.de 142.93.149.34 \[27/Sep/2019:05:51:28 +0200\] "POST /wp-login.php HTTP/1.1" 200 2165 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ft-1848-basketball.de 142.93.149.34 \[27/Sep/2019:05:51:29 +0200\] "POST /wp-login.php HTTP/1.1" 200 2136 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-09-27 15:47:00 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.149.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22602
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.149.210. IN A
;; AUTHORITY SECTION:
. 504 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:23:31 CST 2022
;; MSG SIZE rcvd: 107
210.149.93.142.in-addr.arpa domain name pointer elitedevelopments.ca-2021.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
210.149.93.142.in-addr.arpa name = elitedevelopments.ca-2021.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.84.224.51 | attackbots | 20 attempts against mh-ssh on wheat |
2020-07-29 04:41:28 |
| 115.223.7.110 | attackbotsspam | Spam comment : Can mushroom leather change the way we perceive, wear and consume fashion? https://wtvox.com/fashion-innovation/mushroom-leather/ |
2020-07-29 04:48:23 |
| 167.99.51.159 | attackspambots | SSH Brute Force |
2020-07-29 04:24:20 |
| 178.71.10.87 | attackbotsspam | Spam comment : HoOkAh MaGic наш официальный бренд Набрав в поисковике Вы можете посетить наш сайт и возможно приобрести кальяны и всё для них. Доставка по всей России Бесплатная консультация Отправка в день заказа Персональные скидки Строго 18+ |
2020-07-29 04:47:53 |
| 207.46.13.72 | attackspam | Automatic report - Banned IP Access |
2020-07-29 04:27:57 |
| 5.188.211.15 | attack | Spam comment : nCWOg2 gwzcgijyckjw, [url=http://iywmdqmabyxr.com/]iywmdqmabyxr[/url], [link=http://ysghlfanzagj.com/]ysghlfanzagj[/link], http://gvazztctgcjo.com/ |
2020-07-29 04:54:45 |
| 62.149.29.51 | attack | Spam comment : Знаете ли вы? Советский разведчик-нелегал создал в Европе разведгруппу, успешно проработавшую всю войну. Консервативные художественные критики обрушились на портрет девушки, называя её гермафродитом, дочерью Каина и проституткой. Каждая шестая яркая галактика во Вселенной очень сильно испускает газы. Андрогинный псевдоним не спас автора от расшифровки. Иногда для поддержки экономики деньги «разбрасывают с вертолёта». arbeca |
2020-07-29 04:49:20 |
| 37.115.216.98 | attack | Spam comment : Добрый день Нашел самую не дорогую аптеку Очень дешевые препараты Имфинзи 500мг (Durvalumab) - Imfinzi 500mg (Дурвалумаб) отзывы |
2020-07-29 04:44:22 |
| 103.28.121.58 | attackspam | Spam comment : A safe, private and temporary storage for your photos. Encrptd.com copy-protects, auto-deletes and never logs personal data. How to use this website? Assuming that you want to securely share an image (or several) with somebody: Open https://encrptd.com/ By default the images are deleted immediately after they are first viewed - you can change that by choosing a different option in the "Your images will be deleted" drop-down selector Click on the big blue button that says "Click to upload" A small new window will appear prompting you to choose images to upload (you can select more than one by holding shift when clicking on files) Select your images and click "OK" when done The window would close and your images would proceed to be uploaded As soon as the upload process finished you should be presented with a url of your newly created album You can immediately copy the link url and send it to somebody You can also open the link yourself and see if the album looks as |
2020-07-29 04:35:38 |
| 37.120.144.232 | attack | Spam comment : Круто, давно искал _________________ игра azino777 |
2020-07-29 04:39:18 |
| 182.151.2.98 | attack | Jul 28 22:17:53 jane sshd[30098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.2.98 Jul 28 22:17:55 jane sshd[30098]: Failed password for invalid user meruem from 182.151.2.98 port 58157 ssh2 ... |
2020-07-29 04:52:36 |
| 195.70.43.234 | attackbotsspam | Automatic report - Banned IP Access |
2020-07-29 04:50:48 |
| 111.231.139.30 | attackbots | Jul 28 22:17:53 santamaria sshd\[19274\]: Invalid user alias from 111.231.139.30 Jul 28 22:17:53 santamaria sshd\[19274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.139.30 Jul 28 22:17:56 santamaria sshd\[19274\]: Failed password for invalid user alias from 111.231.139.30 port 56103 ssh2 ... |
2020-07-29 04:51:38 |
| 27.115.127.210 | attackbots | Jul 28 22:31:06 meumeu sshd[366787]: Invalid user chouping from 27.115.127.210 port 40324 Jul 28 22:31:06 meumeu sshd[366787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.127.210 Jul 28 22:31:06 meumeu sshd[366787]: Invalid user chouping from 27.115.127.210 port 40324 Jul 28 22:31:08 meumeu sshd[366787]: Failed password for invalid user chouping from 27.115.127.210 port 40324 ssh2 Jul 28 22:34:27 meumeu sshd[366932]: Invalid user michelle from 27.115.127.210 port 35678 Jul 28 22:34:27 meumeu sshd[366932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.127.210 Jul 28 22:34:27 meumeu sshd[366932]: Invalid user michelle from 27.115.127.210 port 35678 Jul 28 22:34:30 meumeu sshd[366932]: Failed password for invalid user michelle from 27.115.127.210 port 35678 ssh2 Jul 28 22:37:45 meumeu sshd[367091]: Invalid user ashkan from 27.115.127.210 port 59318 ... |
2020-07-29 04:42:57 |
| 95.153.86.158 | attackbots | Spam comment : Ian Ceban - Nu pot trai fara tine (Official Video) |
2020-07-29 05:00:49 |