城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.208.69 | attackbots | 04/12/2020-17:16:51.543747 142.93.208.69 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-13 08:28:08 |
| 142.93.208.158 | attack | SSH login attempts. |
2020-03-19 16:07:54 |
| 142.93.208.220 | attackbots | Mar 13 14:03:07 web8 sshd\[15273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.220 user=root Mar 13 14:03:09 web8 sshd\[15273\]: Failed password for root from 142.93.208.220 port 57966 ssh2 Mar 13 14:08:03 web8 sshd\[17919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.220 user=root Mar 13 14:08:05 web8 sshd\[17919\]: Failed password for root from 142.93.208.220 port 41744 ssh2 Mar 13 14:12:56 web8 sshd\[20670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.220 user=root |
2020-03-13 23:10:13 |
| 142.93.208.158 | attackbotsspam | Mar 9 18:36:45 lukav-desktop sshd\[16609\]: Invalid user tr from 142.93.208.158 Mar 9 18:36:45 lukav-desktop sshd\[16609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.158 Mar 9 18:36:46 lukav-desktop sshd\[16609\]: Failed password for invalid user tr from 142.93.208.158 port 36694 ssh2 Mar 9 18:40:15 lukav-desktop sshd\[16638\]: Invalid user docs from 142.93.208.158 Mar 9 18:40:15 lukav-desktop sshd\[16638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.158 |
2020-03-10 03:20:21 |
| 142.93.208.250 | attack | 2020-03-07T12:44:19.452885dmca.cloudsearch.cf sshd[26998]: Invalid user ubuntu from 142.93.208.250 port 52048 2020-03-07T12:44:19.459556dmca.cloudsearch.cf sshd[26998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=demo.b2grow.com 2020-03-07T12:44:19.452885dmca.cloudsearch.cf sshd[26998]: Invalid user ubuntu from 142.93.208.250 port 52048 2020-03-07T12:44:21.949980dmca.cloudsearch.cf sshd[26998]: Failed password for invalid user ubuntu from 142.93.208.250 port 52048 ssh2 2020-03-07T12:48:08.529859dmca.cloudsearch.cf sshd[27227]: Invalid user leo from 142.93.208.250 port 52778 2020-03-07T12:48:08.535947dmca.cloudsearch.cf sshd[27227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=demo.b2grow.com 2020-03-07T12:48:08.529859dmca.cloudsearch.cf sshd[27227]: Invalid user leo from 142.93.208.250 port 52778 2020-03-07T12:48:10.465672dmca.cloudsearch.cf sshd[27227]: Failed password for invalid user leo from 142. ... |
2020-03-07 21:06:37 |
| 142.93.208.24 | attackbots | Jan1505:49:43server4pure-ftpd:\(\?@103.16.228.20\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:09server4pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:28server4pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:30server4pure-ftpd:\(\?@103.16.228.20\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:55server4pure-ftpd:\(\?@142.93.208.24\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:56server4pure-ftpd:\(\?@103.16.228.20\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:59server4pure-ftpd:\(\?@103.18.179.196\)[WARNING]Authenticationfailedforuser[info]Jan1505:50:02server4pure-ftpd:\(\?@35.194.4.89\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:22server4pure-ftpd:\(\?@144.217.197.11\)[WARNING]Authenticationfailedforuser[info]Jan1505:49:48server4pure-ftpd:\(\?@103.16.228.20\)[WARNING]Authenticationfailedforuser[info]IPAddressesBlocked:103.16.228.20\(HK/HongKong/www.northridgefinancialpartners.com\)144.217.197.11\(US/ |
2020-01-15 17:25:24 |
| 142.93.208.250 | attackbotsspam | Unauthorized connection attempt detected from IP address 142.93.208.250 to port 2220 [J] |
2020-01-14 05:10:49 |
| 142.93.208.92 | attackbotsspam | Dec 26 07:18:41 mail sshd\[2145\]: Invalid user ftpuser from 142.93.208.92 Dec 26 07:18:53 mail sshd\[2149\]: Invalid user git from 142.93.208.92 Dec 26 07:19:06 mail sshd\[2166\]: Invalid user oracle from 142.93.208.92 Dec 26 07:19:33 mail sshd\[2172\]: Invalid user ftpuser from 142.93.208.92 Dec 26 07:19:47 mail sshd\[2175\]: Invalid user oracle from 142.93.208.92 ... |
2019-12-26 22:06:43 |
| 142.93.208.92 | attackbots | 2019-12-25T07:09:01.598728shield sshd\[31609\]: Invalid user redis from 142.93.208.92 port 53980 2019-12-25T07:09:01.603088shield sshd\[31609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.92 2019-12-25T07:09:03.531532shield sshd\[31609\]: Failed password for invalid user redis from 142.93.208.92 port 53980 ssh2 2019-12-25T07:12:35.235777shield sshd\[559\]: Invalid user www from 142.93.208.92 port 33408 2019-12-25T07:12:35.240148shield sshd\[559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.92 |
2019-12-25 20:39:01 |
| 142.93.208.190 | attackbotsspam | RDP Bruteforce |
2019-12-18 21:48:05 |
| 142.93.208.219 | attackspambots | Sep 7 13:18:40 eddieflores sshd\[27227\]: Invalid user postgres from 142.93.208.219 Sep 7 13:18:40 eddieflores sshd\[27227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219 Sep 7 13:18:42 eddieflores sshd\[27227\]: Failed password for invalid user postgres from 142.93.208.219 port 34816 ssh2 Sep 7 13:23:09 eddieflores sshd\[27563\]: Invalid user oracle from 142.93.208.219 Sep 7 13:23:09 eddieflores sshd\[27563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219 |
2019-09-08 07:33:17 |
| 142.93.208.219 | attackspambots | Sep 5 00:35:31 hpm sshd\[13710\]: Invalid user webmaster from 142.93.208.219 Sep 5 00:35:31 hpm sshd\[13710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219 Sep 5 00:35:33 hpm sshd\[13710\]: Failed password for invalid user webmaster from 142.93.208.219 port 38906 ssh2 Sep 5 00:40:11 hpm sshd\[14245\]: Invalid user mysqlmysql from 142.93.208.219 Sep 5 00:40:11 hpm sshd\[14245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219 |
2019-09-05 18:55:20 |
| 142.93.208.219 | attack | Aug 28 05:57:31 hiderm sshd\[29194\]: Invalid user test from 142.93.208.219 Aug 28 05:57:31 hiderm sshd\[29194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219 Aug 28 05:57:33 hiderm sshd\[29194\]: Failed password for invalid user test from 142.93.208.219 port 57578 ssh2 Aug 28 06:02:13 hiderm sshd\[29594\]: Invalid user ftpuser1 from 142.93.208.219 Aug 28 06:02:13 hiderm sshd\[29594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219 |
2019-08-29 07:52:12 |
| 142.93.208.219 | attackbots | Aug 22 12:54:39 vps691689 sshd[19492]: Failed password for root from 142.93.208.219 port 49438 ssh2 Aug 22 12:59:39 vps691689 sshd[19631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.208.219 ... |
2019-08-22 19:15:07 |
| 142.93.208.158 | attackbots | SSH Brute-Force reported by Fail2Ban |
2019-08-13 03:51:15 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.208.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60822
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.208.244. IN A
;; AUTHORITY SECTION:
. 252 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 19:33:46 CST 2022
;; MSG SIZE rcvd: 107
Host 244.208.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 244.208.93.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 141.98.80.173 | attackspambots | Invalid user admin from 141.98.80.173 port 58303 |
2020-02-13 07:34:00 |
| 176.199.132.109 | attackspam | Feb 13 01:18:49 server sshd\[16269\]: Invalid user pi from 176.199.132.109 Feb 13 01:18:49 server sshd\[16269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-176-199-132-109.hsi06.unitymediagroup.de Feb 13 01:18:49 server sshd\[16271\]: Invalid user pi from 176.199.132.109 Feb 13 01:18:49 server sshd\[16271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-176-199-132-109.hsi06.unitymediagroup.de Feb 13 01:18:51 server sshd\[16269\]: Failed password for invalid user pi from 176.199.132.109 port 48832 ssh2 ... |
2020-02-13 07:56:30 |
| 45.125.66.232 | attackbots | Rude login attack (4 tries in 1d) |
2020-02-13 07:39:27 |
| 106.13.172.11 | attack | Feb 13 00:43:22 [host] sshd[18900]: pam_unix(sshd: Feb 13 00:43:24 [host] sshd[18900]: Failed passwor Feb 13 00:45:37 [host] sshd[18909]: Invalid user d |
2020-02-13 07:59:48 |
| 187.190.102.74 | attack | Feb 13 03:18:58 gw1 sshd[24725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.102.74 Feb 13 03:19:00 gw1 sshd[24725]: Failed password for invalid user admin from 187.190.102.74 port 56017 ssh2 ... |
2020-02-13 07:47:54 |
| 193.80.232.39 | attackspambots | Automatic report - SSH Brute-Force Attack |
2020-02-13 07:23:40 |
| 218.92.0.208 | attackbotsspam | Feb 13 00:32:51 eventyay sshd[24318]: Failed password for root from 218.92.0.208 port 46462 ssh2 Feb 13 00:34:01 eventyay sshd[24334]: Failed password for root from 218.92.0.208 port 59795 ssh2 ... |
2020-02-13 07:59:21 |
| 77.247.181.162 | attack | 02/13/2020-00:11:32.747172 77.247.181.162 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 79 |
2020-02-13 07:52:02 |
| 168.0.129.169 | attackspam | Telnet/23 MH Probe, BF, Hack - |
2020-02-13 07:55:39 |
| 137.59.162.170 | attack | Feb 13 00:10:48 legacy sshd[2687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.170 Feb 13 00:10:50 legacy sshd[2687]: Failed password for invalid user jonas from 137.59.162.170 port 35444 ssh2 Feb 13 00:16:15 legacy sshd[2978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.170 ... |
2020-02-13 07:29:07 |
| 195.162.96.133 | attack | Telnet/23 MH Probe, BF, Hack - |
2020-02-13 07:30:19 |
| 171.217.55.50 | attackbotsspam | Telnet/23 MH Probe, BF, Hack - |
2020-02-13 07:52:56 |
| 181.130.53.239 | attackbots | Automatic report - Port Scan Attack |
2020-02-13 07:55:12 |
| 193.32.161.31 | attackspam | 02/12/2020-18:28:08.354348 193.32.161.31 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-13 07:56:57 |
| 61.191.130.198 | attack | Brute force attempt |
2020-02-13 07:48:44 |