城市(city): unknown
省份(region): unknown
国家(country): Egypt
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 41.39.30.242 | attackbots | Unauthorized connection attempt from IP address 41.39.30.242 on Port 445(SMB) |
2020-08-06 21:12:30 |
| 41.39.30.242 | attackspam | Honeypot attack, port: 445, PTR: host-41.39.30.242.tedata.net. |
2020-02-26 03:57:37 |
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to the following terms of Use. See https://afrinic.net/whois/terms
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '41.38.0.0 - 41.39.255.255'
% No abuse contact registered for 41.38.0.0 - 41.39.255.255
inetnum: 41.38.0.0 - 41.39.255.255
netname: All-03
descr: TE Data
country: EG
admin-c: TDCR1-AFRINIC
tech-c: TDCR2-AFRINIC
status: ASSIGNED PA
remarks: ====================================================
remarks: For Internet Abuse & Spam reports : admins@tedata.net
remarks: ====================================================
mnt-by: GEGA-MNT
source: AFRINIC # Filtered
parent: 41.32.0.0 - 41.47.255.255
role: TE Data Contact Role
address: TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address: 28 Km, 6th October 12577, Giza, Egypt
phone: tel:+20-2-33320700
fax-no: tel:+20-2-33320800
admin-c: MH7-AFRINIC
tech-c: TDCR2-AFRINIC
nic-hdl: TDCR1-AFRINIC
abuse-mailbox: abuse@te.eg
mnt-by: TE-Data-MNT
source: AFRINIC # Filtered
role: TE Data Contact Role-2
address: TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address: 28 Km, 6th October 12577, Giza, Egypt
phone: tel:+20-2-33320700
fax-no: tel:+20-2-33320800
admin-c: MH7-AFRINIC
tech-c: TDCR1-AFRINIC
nic-hdl: TDCR2-AFRINIC
abuse-mailbox: abuse@te.eg
mnt-by: TE-Data-MNT
source: AFRINIC # Filtered
% Information related to '41.39.30.0/24AS8452'
route: 41.39.30.0/24
descr: Telecom-Egypt-Data
origin: AS8452
mnt-lower: GEGA-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.39.30.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49446
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.39.30.112. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025113001 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 01 04:30:12 CST 2025
;; MSG SIZE rcvd: 105
Host 112.30.39.41.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 112.30.39.41.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 23.98.74.16 | attackbotsspam | Jul 14 12:25:55 b-admin sshd[6836]: Invalid user dead from 23.98.74.16 port 15057 Jul 14 12:25:55 b-admin sshd[6836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.98.74.16 Jul 14 12:25:55 b-admin sshd[6843]: Invalid user dead from 23.98.74.16 port 15059 Jul 14 12:25:55 b-admin sshd[6845]: Invalid user dead from 23.98.74.16 port 15063 Jul 14 12:25:55 b-admin sshd[6843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.98.74.16 Jul 14 12:25:55 b-admin sshd[6839]: Invalid user dead from 23.98.74.16 port 15055 Jul 14 12:25:55 b-admin sshd[6838]: Invalid user dead from 23.98.74.16 port 15054 Jul 14 12:25:55 b-admin sshd[6837]: Invalid user dead from 23.98.74.16 port 15053 Jul 14 12:25:55 b-admin sshd[6840]: Invalid user dead from 23.98.74.16 port 15056 Jul 14 12:25:55 b-admin sshd[6845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.98.74.16 Ju........ ------------------------------- |
2020-07-16 02:03:11 |
| 14.169.156.11 | attack | Unauthorized connection attempt from IP address 14.169.156.11 on Port 445(SMB) |
2020-07-16 02:04:02 |
| 66.68.187.145 | attackbots | detected by Fail2Ban |
2020-07-16 02:12:22 |
| 189.44.168.34 | attackbots | Unauthorized connection attempt from IP address 189.44.168.34 on Port 445(SMB) |
2020-07-16 01:44:00 |
| 194.26.29.110 | attackspambots | Jul 15 19:31:21 debian-2gb-nbg1-2 kernel: \[17092844.645244\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.110 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=62924 PROTO=TCP SPT=42110 DPT=6600 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-16 01:41:18 |
| 221.195.1.201 | attackspambots | DATE:2020-07-15 16:17:56,IP:221.195.1.201,MATCHES:10,PORT:ssh |
2020-07-16 01:56:58 |
| 182.253.68.122 | attackspambots | Jul 15 17:18:54 scw-focused-cartwright sshd[21725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.68.122 Jul 15 17:18:56 scw-focused-cartwright sshd[21725]: Failed password for invalid user gerhard from 182.253.68.122 port 38676 ssh2 |
2020-07-16 02:05:09 |
| 183.82.98.41 | attackbots | Unauthorized connection attempt from IP address 183.82.98.41 on Port 445(SMB) |
2020-07-16 01:47:15 |
| 212.122.184.247 | attackbotsspam | SMB Server BruteForce Attack |
2020-07-16 02:08:43 |
| 91.225.117.13 | attackspam | Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-07-16 01:50:51 |
| 45.180.148.81 | attackspambots | Unauthorized connection attempt from IP address 45.180.148.81 on Port 445(SMB) |
2020-07-16 01:42:34 |
| 27.211.227.58 | attackspam | Jul 15 01:57:21 lunarastro sshd[31276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.211.227.58 Jul 15 01:57:22 lunarastro sshd[31276]: Failed password for invalid user orathai from 27.211.227.58 port 36716 ssh2 |
2020-07-16 01:56:14 |
| 1.34.221.216 | attackbotsspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-07-16 02:06:26 |
| 51.38.127.227 | attack | Jul 15 17:50:35 vps sshd[13102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.127.227 Jul 15 17:50:37 vps sshd[13102]: Failed password for invalid user leslie from 51.38.127.227 port 49868 ssh2 Jul 15 17:56:43 vps sshd[13376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.127.227 ... |
2020-07-16 02:10:22 |
| 37.28.166.126 | attackbots | Unauthorized connection attempt from IP address 37.28.166.126 on Port 445(SMB) |
2020-07-16 02:18:02 |