城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.48.191 | attack | 11109/tcp 4545/tcp 12805/tcp... [2020-08-30/09-25]50pkt,17pt.(tcp) |
2020-09-26 02:54:00 |
| 142.93.48.191 | attackspam | TCP ports : 4545 / 11109 |
2020-09-25 18:39:21 |
| 142.93.48.191 | attackspambots | 2020-09-15T15:12:08.262284sorsha.thespaminator.com sshd[16347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.191 user=root 2020-09-15T15:12:10.495909sorsha.thespaminator.com sshd[16347]: Failed password for root from 142.93.48.191 port 56048 ssh2 ... |
2020-09-16 03:26:42 |
| 142.93.48.191 | attack | 17418/tcp 17103/tcp 18405/tcp... [2020-08-30/09-15]31pkt,11pt.(tcp) |
2020-09-15 19:30:33 |
| 142.93.48.191 | attack | SSH Scan |
2020-08-31 16:34:29 |
| 142.93.48.191 | attackspambots | Attempted connection to port 18720. |
2020-08-31 07:25:08 |
| 142.93.48.191 | attack | Aug 30 14:31:11 buvik sshd[1558]: Failed password for root from 142.93.48.191 port 43900 ssh2 Aug 30 14:34:52 buvik sshd[2031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.191 user=root Aug 30 14:34:54 buvik sshd[2031]: Failed password for root from 142.93.48.191 port 45650 ssh2 ... |
2020-08-30 21:03:12 |
| 142.93.48.191 | attackbotsspam | "$f2bV_matches" |
2020-08-28 04:24:22 |
| 142.93.48.191 | attackbots | Aug 25 16:56:16 OPSO sshd\[7232\]: Invalid user ftpu from 142.93.48.191 port 39276 Aug 25 16:56:16 OPSO sshd\[7232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.191 Aug 25 16:56:18 OPSO sshd\[7232\]: Failed password for invalid user ftpu from 142.93.48.191 port 39276 ssh2 Aug 25 17:00:30 OPSO sshd\[8411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.191 user=root Aug 25 17:00:32 OPSO sshd\[8411\]: Failed password for root from 142.93.48.191 port 46392 ssh2 |
2020-08-25 23:06:20 |
| 142.93.48.155 | attackbotsspam | Jul 4 14:10:59 prox sshd[6702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 Jul 4 14:11:00 prox sshd[6702]: Failed password for invalid user king from 142.93.48.155 port 40008 ssh2 |
2020-07-05 00:10:52 |
| 142.93.48.155 | attack | 2020-06-16T12:20:32.770817abusebot-5.cloudsearch.cf sshd[15081]: Invalid user vid from 142.93.48.155 port 35614 2020-06-16T12:20:32.775990abusebot-5.cloudsearch.cf sshd[15081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 2020-06-16T12:20:32.770817abusebot-5.cloudsearch.cf sshd[15081]: Invalid user vid from 142.93.48.155 port 35614 2020-06-16T12:20:34.762014abusebot-5.cloudsearch.cf sshd[15081]: Failed password for invalid user vid from 142.93.48.155 port 35614 ssh2 2020-06-16T12:25:36.762081abusebot-5.cloudsearch.cf sshd[15130]: Invalid user sunil from 142.93.48.155 port 57490 2020-06-16T12:25:36.767796abusebot-5.cloudsearch.cf sshd[15130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 2020-06-16T12:25:36.762081abusebot-5.cloudsearch.cf sshd[15130]: Invalid user sunil from 142.93.48.155 port 57490 2020-06-16T12:25:38.823563abusebot-5.cloudsearch.cf sshd[15130]: Failed passw ... |
2020-06-17 01:26:45 |
| 142.93.48.155 | attackspam | Jun 10 10:59:35 game-panel sshd[17497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 Jun 10 10:59:37 game-panel sshd[17497]: Failed password for invalid user wei from 142.93.48.155 port 49882 ssh2 Jun 10 11:02:52 game-panel sshd[17638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 |
2020-06-10 19:24:40 |
| 142.93.48.155 | attackspambots | 2020-06-05T05:03:25.385185shield sshd\[15299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 user=root 2020-06-05T05:03:27.495544shield sshd\[15299\]: Failed password for root from 142.93.48.155 port 59510 ssh2 2020-06-05T05:06:49.229893shield sshd\[17291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 user=root 2020-06-05T05:06:51.343897shield sshd\[17291\]: Failed password for root from 142.93.48.155 port 34986 ssh2 2020-06-05T05:10:13.555304shield sshd\[18612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 user=root |
2020-06-05 14:30:07 |
| 142.93.48.155 | attack | Jun 4 08:25:14 sip sshd[534135]: Failed password for root from 142.93.48.155 port 49300 ssh2 Jun 4 08:28:30 sip sshd[534191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 user=root Jun 4 08:28:33 sip sshd[534191]: Failed password for root from 142.93.48.155 port 53670 ssh2 ... |
2020-06-04 14:39:29 |
| 142.93.48.155 | attack | May 25 14:47:09 sshgateway sshd\[16075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 user=root May 25 14:47:10 sshgateway sshd\[16075\]: Failed password for root from 142.93.48.155 port 43496 ssh2 May 25 14:50:10 sshgateway sshd\[16112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.48.155 user=root |
2020-05-26 00:09:32 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.48.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.48.200. IN A
;; AUTHORITY SECTION:
. 441 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400
;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 09:34:50 CST 2022
;; MSG SIZE rcvd: 106
Host 200.48.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 200.48.93.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 176.31.182.79 | attackbotsspam | " " |
2020-07-19 00:27:15 |
| 14.204.145.108 | attackbotsspam | prod8 ... |
2020-07-19 00:13:25 |
| 182.61.37.144 | attackspambots | Invalid user user1 from 182.61.37.144 port 50004 |
2020-07-19 00:24:26 |
| 91.233.42.38 | attackspam | $f2bV_matches |
2020-07-19 00:01:43 |
| 179.154.56.227 | attackbots | Invalid user mexico from 179.154.56.227 port 46997 |
2020-07-19 00:25:49 |
| 97.84.225.94 | attackbots | Jul 18 16:42:04 ajax sshd[29080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.84.225.94 Jul 18 16:42:06 ajax sshd[29080]: Failed password for invalid user minecraft from 97.84.225.94 port 44976 ssh2 |
2020-07-19 00:00:10 |
| 148.70.102.69 | attackbots | Jul 18 17:38:09 mailserver sshd\[32651\]: Invalid user ubuntu from 148.70.102.69 ... |
2020-07-19 00:30:16 |
| 162.244.77.140 | attackbots | Invalid user ole from 162.244.77.140 port 43512 |
2020-07-19 00:28:01 |
| 42.159.228.125 | attackbots | Jul 18 16:33:20 vm1 sshd[13464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.228.125 Jul 18 16:33:23 vm1 sshd[13464]: Failed password for invalid user webmaster from 42.159.228.125 port 28597 ssh2 ... |
2020-07-19 00:11:34 |
| 191.234.182.188 | attackbots | Invalid user jenkins from 191.234.182.188 port 52582 |
2020-07-19 00:18:35 |
| 210.245.34.243 | attack | Invalid user joe from 210.245.34.243 port 60049 |
2020-07-19 00:15:31 |
| 106.75.110.232 | attack | $f2bV_matches |
2020-07-18 23:57:25 |
| 106.12.38.231 | attack | Invalid user sl from 106.12.38.231 port 53694 |
2020-07-18 23:58:39 |
| 175.106.17.235 | attackspambots | Invalid user smart from 175.106.17.235 port 35972 |
2020-07-19 00:27:48 |
| 104.131.97.47 | attackspam | Jul 18 16:30:23 dev0-dcde-rnet sshd[13051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.97.47 Jul 18 16:30:25 dev0-dcde-rnet sshd[13051]: Failed password for invalid user martin from 104.131.97.47 port 45534 ssh2 Jul 18 16:34:35 dev0-dcde-rnet sshd[13142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.97.47 |
2020-07-18 23:59:23 |