城市(city): North Bergen
省份(region): New Jersey
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.240.62 | spamattack | PHISHING AND SPAM ATTACK FROM "Important Notification - newsletter@app.ksinergy.biz - " : SUBJECT "Congrats! Open Immediately! " : RECEIVED "from mail-02.ksinergy.biz ([142.93.240.62]:39126) " : DATE/TIMESENT "Mon, 01 Mar 2021 10:14:52 ": IP ADDRESS "inetnum: 142.93.0.0 - 142.93.255.255 OrgName: DigitalOcean, LLC |
2021-03-01 08:16:37 |
| 142.93.240.62 | spamattack | PHISHING AND SPAM ATTACK FROM "Casino For You - newsletter@app.ksinergy.biz -" : SUBJECT "Join today and receive an amazing welcome bonus " : RECEIVED "from mail-02.ksinergy.biz ([142.93.240.62]:57421) " : DATE/TIMESENT "Tue, 23 Feb 2021 01:27:07 " |
2021-02-23 04:32:24 |
| 142.93.212.91 | attackbotsspam | SSH BruteForce Attack |
2020-10-13 01:56:49 |
| 142.93.237.57 | attack | Multiport scan 2 ports : 1583 27080 |
2020-10-12 21:16:28 |
| 142.93.212.91 | attack | Oct 12 10:23:09 localhost sshd\[19098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.91 user=root Oct 12 10:23:11 localhost sshd\[19098\]: Failed password for root from 142.93.212.91 port 59394 ssh2 Oct 12 10:27:27 localhost sshd\[19552\]: Invalid user sanjeev from 142.93.212.91 Oct 12 10:27:27 localhost sshd\[19552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.91 Oct 12 10:27:29 localhost sshd\[19552\]: Failed password for invalid user sanjeev from 142.93.212.91 port 36984 ssh2 ... |
2020-10-12 17:20:25 |
| 142.93.237.57 | attack | 1089/tcp 5984/tcp [2020-10-11]2pkt |
2020-10-12 12:46:46 |
| 142.93.211.36 | attackspambots | Oct 12 00:25:27 *hidden* sshd[869]: Failed password for *hidden* from 142.93.211.36 port 56534 ssh2 Oct 12 00:28:28 *hidden* sshd[1320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.36 user=root Oct 12 00:28:30 *hidden* sshd[1320]: Failed password for *hidden* from 142.93.211.36 port 40212 ssh2 |
2020-10-12 07:11:11 |
| 142.93.209.251 | attackbotsspam | Oct 11 22:07:55 v2202009116398126984 sshd[2515868]: Invalid user elke from 142.93.209.251 port 44534 ... |
2020-10-12 06:24:15 |
| 142.93.223.118 | attackspam | SSH login attempts. |
2020-10-12 04:12:31 |
| 142.93.211.36 | attackspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-10-11 23:23:00 |
| 142.93.209.251 | attack | Oct 11 16:26:57 sso sshd[30604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251 Oct 11 16:26:59 sso sshd[30604]: Failed password for invalid user chris from 142.93.209.251 port 59794 ssh2 ... |
2020-10-11 22:34:31 |
| 142.93.223.118 | attackspam | SSH login attempts. |
2020-10-11 20:11:30 |
| 142.93.211.36 | attack | Fail2Ban |
2020-10-11 15:21:45 |
| 142.93.209.251 | attackbots | (sshd) Failed SSH login from 142.93.209.251 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 00:54:24 optimus sshd[28004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251 user=root Oct 11 00:54:27 optimus sshd[28004]: Failed password for root from 142.93.209.251 port 54930 ssh2 Oct 11 01:19:11 optimus sshd[6951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251 user=root Oct 11 01:19:13 optimus sshd[6951]: Failed password for root from 142.93.209.251 port 56072 ssh2 Oct 11 01:24:49 optimus sshd[11852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251 user=root |
2020-10-11 14:29:57 |
| 142.93.223.118 | attackspam | 2020-10-11T07:03:53.476597lavrinenko.info sshd[19701]: Failed password for root from 142.93.223.118 port 55582 ssh2 2020-10-11T07:07:58.292860lavrinenko.info sshd[19798]: Invalid user next from 142.93.223.118 port 33376 2020-10-11T07:07:58.302917lavrinenko.info sshd[19798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.223.118 2020-10-11T07:07:58.292860lavrinenko.info sshd[19798]: Invalid user next from 142.93.223.118 port 33376 2020-10-11T07:08:00.553715lavrinenko.info sshd[19798]: Failed password for invalid user next from 142.93.223.118 port 33376 ssh2 ... |
2020-10-11 12:10:33 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.2.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.2.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025061000 1800 900 604800 86400
;; Query time: 284 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 11 02:00:08 CST 2025
;; MSG SIZE rcvd: 104
Host 42.2.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.2.93.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.103.181.18 | attack | Jul 11 02:33:37 areeb-Workstation sshd\[5070\]: Invalid user admin from 103.103.181.18 Jul 11 02:33:37 areeb-Workstation sshd\[5070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.103.181.18 Jul 11 02:33:39 areeb-Workstation sshd\[5070\]: Failed password for invalid user admin from 103.103.181.18 port 42858 ssh2 ... |
2019-07-11 07:53:28 |
| 89.232.70.89 | attackspam | Unauthorized connection attempt from IP address 89.232.70.89 on Port 445(SMB) |
2019-07-11 07:41:18 |
| 174.138.13.170 | attackspambots | Jul 10 19:16:40 MK-Soft-VM5 sshd\[12343\]: Invalid user admin from 174.138.13.170 port 33294 Jul 10 19:16:40 MK-Soft-VM5 sshd\[12343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.13.170 Jul 10 19:16:43 MK-Soft-VM5 sshd\[12343\]: Failed password for invalid user admin from 174.138.13.170 port 33294 ssh2 ... |
2019-07-11 07:32:47 |
| 61.50.255.35 | attackbotsspam | ssh failed login |
2019-07-11 07:46:21 |
| 191.184.203.71 | attackspambots | detected by Fail2Ban |
2019-07-11 07:24:58 |
| 133.242.79.30 | attack | Invalid user james from 133.242.79.30 port 40169 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.79.30 Failed password for invalid user james from 133.242.79.30 port 40169 ssh2 Invalid user ls from 133.242.79.30 port 57428 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.79.30 |
2019-07-11 07:47:10 |
| 114.69.249.178 | attackspambots | Unauthorized connection attempt from IP address 114.69.249.178 on Port 445(SMB) |
2019-07-11 07:22:10 |
| 184.22.0.169 | attackbotsspam | Jul 10 22:10:50 xxxxxxx0 sshd[25515]: Invalid user user001 from 184.22.0.169 port 37658 Jul 10 22:10:50 xxxxxxx0 sshd[25515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.22.0.169 Jul 10 22:10:52 xxxxxxx0 sshd[25515]: Failed password for invalid user user001 from 184.22.0.169 port 37658 ssh2 Jul 10 22:13:07 xxxxxxx0 sshd[25936]: Invalid user asd from 184.22.0.169 port 58790 Jul 10 22:13:07 xxxxxxx0 sshd[25936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.22.0.169 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=184.22.0.169 |
2019-07-11 08:11:46 |
| 217.182.165.158 | attack | Jul 10 19:03:29 MK-Soft-VM3 sshd\[16251\]: Invalid user csaba from 217.182.165.158 port 45526 Jul 10 19:03:29 MK-Soft-VM3 sshd\[16251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.165.158 Jul 10 19:03:32 MK-Soft-VM3 sshd\[16251\]: Failed password for invalid user csaba from 217.182.165.158 port 45526 ssh2 ... |
2019-07-11 08:05:54 |
| 115.231.219.29 | attackbots | 2019-07-10 22:59:23 172666 \[Warning\] Access denied for user 'root'@'115.231.219.29' \(using password: YES\) 2019-07-10 22:59:24 172667 \[Warning\] Access denied for user 'root'@'115.231.219.29' \(using password: YES\) 2019-07-10 22:59:26 172668 \[Warning\] Access denied for user 'root'@'115.231.219.29' \(using password: YES\) ... |
2019-07-11 07:34:59 |
| 112.161.203.170 | attack | Jul 10 20:59:38 fr01 sshd[6081]: Invalid user s from 112.161.203.170 Jul 10 20:59:38 fr01 sshd[6081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.161.203.170 Jul 10 20:59:38 fr01 sshd[6081]: Invalid user s from 112.161.203.170 Jul 10 20:59:41 fr01 sshd[6081]: Failed password for invalid user s from 112.161.203.170 port 43262 ssh2 Jul 10 21:03:45 fr01 sshd[6849]: Invalid user test from 112.161.203.170 ... |
2019-07-11 07:54:04 |
| 191.53.198.116 | attackspambots | Unauthorized connection attempt from IP address 191.53.198.116 on Port 587(SMTP-MSA) |
2019-07-11 07:32:18 |
| 69.196.164.172 | attack | Jul 10 23:48:21 web sshd\[31639\]: Invalid user doudou from 69.196.164.172 Jul 10 23:48:21 web sshd\[31639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.196.164.172 Jul 10 23:48:23 web sshd\[31639\]: Failed password for invalid user doudou from 69.196.164.172 port 51820 ssh2 Jul 10 23:50:39 web sshd\[31645\]: Invalid user ncs from 69.196.164.172 Jul 10 23:50:39 web sshd\[31645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.196.164.172 ... |
2019-07-11 08:09:07 |
| 117.48.202.15 | attack | Jul 11 00:30:46 vibhu-HP-Z238-Microtower-Workstation sshd\[32136\]: Invalid user ajeet from 117.48.202.15 Jul 11 00:30:46 vibhu-HP-Z238-Microtower-Workstation sshd\[32136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.202.15 Jul 11 00:30:48 vibhu-HP-Z238-Microtower-Workstation sshd\[32136\]: Failed password for invalid user ajeet from 117.48.202.15 port 54836 ssh2 Jul 11 00:33:58 vibhu-HP-Z238-Microtower-Workstation sshd\[32675\]: Invalid user marina from 117.48.202.15 Jul 11 00:33:58 vibhu-HP-Z238-Microtower-Workstation sshd\[32675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.202.15 ... |
2019-07-11 07:43:44 |
| 51.38.51.113 | attack | Automatic report |
2019-07-11 07:38:23 |