城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): DigitalOcean LLC
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Data Center/Web Hosting/Transit
类型 | 评论内容 | 时间 |
---|---|---|
attack | IP: 142.93.53.155 ASN: AS14061 DigitalOcean LLC Port: Simple Mail Transfer 25 Found in one or more Blacklists Date: 16/12/2019 9:52:44 AM UTC |
2019-12-16 18:06:57 |
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
142.93.53.113 | attack | Jun 9 14:08:18 debian-2gb-nbg1-2 kernel: \[13963233.624945\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=142.93.53.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=53146 PROTO=TCP SPT=40647 DPT=7441 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-09 21:03:27 |
142.93.53.214 | attackspam | SSH login attempts. |
2020-05-28 15:20:43 |
142.93.53.214 | attack | May 21 19:47:29 ns382633 sshd\[24993\]: Invalid user jul from 142.93.53.214 port 43918 May 21 19:47:29 ns382633 sshd\[24993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 May 21 19:47:31 ns382633 sshd\[24993\]: Failed password for invalid user jul from 142.93.53.214 port 43918 ssh2 May 21 19:53:45 ns382633 sshd\[26045\]: Invalid user ansible from 142.93.53.214 port 40642 May 21 19:53:45 ns382633 sshd\[26045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 |
2020-05-22 02:58:27 |
142.93.53.113 | attack | Unauthorized connection attempt detected from IP address 142.93.53.113 to port 10345 [T] |
2020-05-07 01:56:28 |
142.93.53.214 | attackbots | May 6 11:16:57 minden010 sshd[10471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 May 6 11:16:59 minden010 sshd[10471]: Failed password for invalid user rabbitmq from 142.93.53.214 port 33208 ssh2 May 6 11:20:57 minden010 sshd[12476]: Failed password for root from 142.93.53.214 port 43636 ssh2 ... |
2020-05-06 18:04:54 |
142.93.53.214 | attackbots | May 5 01:33:46 ift sshd\[49193\]: Invalid user ct from 142.93.53.214May 5 01:33:49 ift sshd\[49193\]: Failed password for invalid user ct from 142.93.53.214 port 36848 ssh2May 5 01:37:50 ift sshd\[50050\]: Invalid user qcp from 142.93.53.214May 5 01:37:52 ift sshd\[50050\]: Failed password for invalid user qcp from 142.93.53.214 port 48088 ssh2May 5 01:41:49 ift sshd\[50606\]: Invalid user maluks from 142.93.53.214 ... |
2020-05-05 09:11:34 |
142.93.53.113 | attackbots | May 3 11:06:13 debian-2gb-nbg1-2 kernel: \[10755677.222658\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=142.93.53.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=29840 PROTO=TCP SPT=48732 DPT=15885 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-03 17:29:00 |
142.93.53.214 | attackspam | Apr 30 14:44:56 electroncash sshd[12907]: Invalid user tk from 142.93.53.214 port 44666 Apr 30 14:44:56 electroncash sshd[12907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 Apr 30 14:44:56 electroncash sshd[12907]: Invalid user tk from 142.93.53.214 port 44666 Apr 30 14:44:58 electroncash sshd[12907]: Failed password for invalid user tk from 142.93.53.214 port 44666 ssh2 Apr 30 14:49:21 electroncash sshd[14026]: Invalid user test from 142.93.53.214 port 51814 ... |
2020-04-30 21:00:27 |
142.93.53.214 | attack | Apr 28 08:44:01 NPSTNNYC01T sshd[29310]: Failed password for root from 142.93.53.214 port 40566 ssh2 Apr 28 08:48:28 NPSTNNYC01T sshd[29763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 Apr 28 08:48:30 NPSTNNYC01T sshd[29763]: Failed password for invalid user gituser from 142.93.53.214 port 52862 ssh2 ... |
2020-04-28 21:17:47 |
142.93.53.214 | attackspambots | Invalid user admin from 142.93.53.214 port 59382 |
2020-04-23 06:12:10 |
142.93.53.214 | attackspam | srv02 Mass scanning activity detected Target: 22893 .. |
2020-04-20 07:36:35 |
142.93.53.214 | attackspambots | Invalid user test from 142.93.53.214 port 51324 |
2020-04-18 17:51:35 |
142.93.53.214 | attackspam | Apr 17 15:28:24 v22018086721571380 sshd[17578]: Failed password for invalid user jd from 142.93.53.214 port 59030 ssh2 |
2020-04-17 21:57:18 |
142.93.53.214 | attackbots | Apr 13 19:12:00 OPSO sshd\[17369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 user=root Apr 13 19:12:02 OPSO sshd\[17369\]: Failed password for root from 142.93.53.214 port 49278 ssh2 Apr 13 19:16:35 OPSO sshd\[18381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 user=root Apr 13 19:16:37 OPSO sshd\[18381\]: Failed password for root from 142.93.53.214 port 48856 ssh2 Apr 13 19:21:00 OPSO sshd\[19513\]: Invalid user 2wsx from 142.93.53.214 port 48444 Apr 13 19:21:00 OPSO sshd\[19513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 |
2020-04-14 01:31:02 |
142.93.53.113 | attack | " " |
2020-04-13 08:20:13 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.53.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.53.155. IN A
;; AUTHORITY SECTION:
. 557 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019121600 1800 900 604800 86400
;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 16 18:06:54 CST 2019
;; MSG SIZE rcvd: 117
155.53.93.142.in-addr.arpa domain name pointer ghiz2.daerns.live.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
155.53.93.142.in-addr.arpa name = ghiz2.daerns.live.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
89.207.108.59 | attack | $f2bV_matches |
2020-05-14 12:34:23 |
106.12.208.31 | attackspam | Bruteforce detected by fail2ban |
2020-05-14 12:14:43 |
202.90.199.206 | attackbots | May 14 05:54:32 pornomens sshd\[19073\]: Invalid user demo from 202.90.199.206 port 46462 May 14 05:54:32 pornomens sshd\[19073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.90.199.206 May 14 05:54:34 pornomens sshd\[19073\]: Failed password for invalid user demo from 202.90.199.206 port 46462 ssh2 ... |
2020-05-14 12:31:37 |
200.40.45.82 | attackspambots | May 14 06:06:07 OPSO sshd\[32340\]: Invalid user serverpilot from 200.40.45.82 port 54954 May 14 06:06:07 OPSO sshd\[32340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.40.45.82 May 14 06:06:09 OPSO sshd\[32340\]: Failed password for invalid user serverpilot from 200.40.45.82 port 54954 ssh2 May 14 06:10:04 OPSO sshd\[529\]: Invalid user redis from 200.40.45.82 port 56498 May 14 06:10:04 OPSO sshd\[529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.40.45.82 |
2020-05-14 12:27:42 |
51.77.211.94 | attack | May 14 03:11:34 XXX sshd[26257]: Invalid user acer from 51.77.211.94 port 55010 |
2020-05-14 12:08:31 |
51.38.238.165 | attack | k+ssh-bruteforce |
2020-05-14 12:21:49 |
198.98.58.248 | attackbots | *Port Scan* detected from 198.98.58.248 (US/United States/New York/New York/-). 4 hits in the last 80 seconds |
2020-05-14 12:12:15 |
198.108.67.31 | attack | Honeypot hit. |
2020-05-14 12:22:58 |
222.186.15.62 | attack | May 14 11:29:59 itv-usvr-02 sshd[15956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root May 14 11:30:01 itv-usvr-02 sshd[15956]: Failed password for root from 222.186.15.62 port 47133 ssh2 |
2020-05-14 12:36:48 |
87.251.74.48 | attack | Wordpress malicious attack:[sshd] |
2020-05-14 12:09:14 |
190.104.149.194 | attack | May 14 05:54:35 [host] sshd[17759]: Invalid user d May 14 05:54:35 [host] sshd[17759]: pam_unix(sshd: May 14 05:54:37 [host] sshd[17759]: Failed passwor |
2020-05-14 12:05:11 |
36.111.182.126 | attackspambots | May 14 04:07:38 *** sshd[21710]: Invalid user openkm from 36.111.182.126 |
2020-05-14 12:33:24 |
125.85.201.103 | attack | May 14 09:17:47 gw1 sshd[4699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.85.201.103 May 14 09:17:49 gw1 sshd[4699]: Failed password for invalid user csgo from 125.85.201.103 port 36650 ssh2 ... |
2020-05-14 12:31:07 |
187.155.200.84 | attackbots | May 14 06:05:31 ns392434 sshd[19397]: Invalid user torrent from 187.155.200.84 port 49536 May 14 06:05:31 ns392434 sshd[19397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.155.200.84 May 14 06:05:31 ns392434 sshd[19397]: Invalid user torrent from 187.155.200.84 port 49536 May 14 06:05:33 ns392434 sshd[19397]: Failed password for invalid user torrent from 187.155.200.84 port 49536 ssh2 May 14 06:11:21 ns392434 sshd[19590]: Invalid user reinhard from 187.155.200.84 port 52176 May 14 06:11:21 ns392434 sshd[19590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.155.200.84 May 14 06:11:21 ns392434 sshd[19590]: Invalid user reinhard from 187.155.200.84 port 52176 May 14 06:11:22 ns392434 sshd[19590]: Failed password for invalid user reinhard from 187.155.200.84 port 52176 ssh2 May 14 06:15:11 ns392434 sshd[19738]: Invalid user provider from 187.155.200.84 port 59930 |
2020-05-14 12:24:29 |
167.99.155.36 | attack | May 13 22:14:37 server1 sshd\[23415\]: Failed password for invalid user ovenfresh from 167.99.155.36 port 47120 ssh2 May 13 22:18:23 server1 sshd\[24573\]: Invalid user dracula from 167.99.155.36 May 13 22:18:23 server1 sshd\[24573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.155.36 May 13 22:18:24 server1 sshd\[24573\]: Failed password for invalid user dracula from 167.99.155.36 port 55472 ssh2 May 13 22:22:20 server1 sshd\[25671\]: Invalid user alejandro from 167.99.155.36 ... |
2020-05-14 12:24:53 |