城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): FPT Telecom Company
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Fixed Line ISP
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attack | Port scan attempt detected by AWS-CCS, CTS, India |
2019-09-01 08:50:19 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 42.119.75.120 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-28 17:16:34 |
| 42.119.75.67 | attack | Unauthorized connection attempt detected from IP address 42.119.75.67 to port 23 [J] |
2020-02-05 21:24:12 |
| 42.119.75.67 | attackbots | Unauthorized connection attempt detected from IP address 42.119.75.67 to port 23 [J] |
2020-01-31 05:24:08 |
| 42.119.75.76 | attack | Unauthorized connection attempt detected from IP address 42.119.75.76 to port 23 [J] |
2020-01-30 23:56:32 |
| 42.119.75.31 | attackbotsspam | Telnetd brute force attack detected by fail2ban |
2019-10-30 01:10:12 |
| 42.119.75.72 | attackbots | port scan and connect, tcp 23 (telnet) |
2019-10-29 05:09:28 |
| 42.119.75.128 | attack | port scan and connect, tcp 23 (telnet) |
2019-10-23 23:22:22 |
| 42.119.75.25 | attack | Unauthorised access (Oct 6) SRC=42.119.75.25 LEN=40 TTL=48 ID=44696 TCP DPT=8080 WINDOW=39814 SYN Unauthorised access (Oct 6) SRC=42.119.75.25 LEN=40 TTL=48 ID=43552 TCP DPT=8080 WINDOW=39814 SYN Unauthorised access (Oct 6) SRC=42.119.75.25 LEN=40 TTL=48 ID=60912 TCP DPT=8080 WINDOW=39814 SYN Unauthorised access (Oct 6) SRC=42.119.75.25 LEN=40 TTL=48 ID=50945 TCP DPT=8080 WINDOW=287 SYN |
2019-10-07 01:10:08 |
| 42.119.75.25 | attackspam | (Oct 5) LEN=40 TTL=47 ID=65261 TCP DPT=8080 WINDOW=39814 SYN (Oct 5) LEN=40 TTL=47 ID=51330 TCP DPT=8080 WINDOW=23298 SYN (Oct 5) LEN=40 TTL=47 ID=40892 TCP DPT=8080 WINDOW=39814 SYN (Oct 4) LEN=40 TTL=47 ID=16925 TCP DPT=8080 WINDOW=39814 SYN (Oct 4) LEN=40 TTL=47 ID=53265 TCP DPT=8080 WINDOW=35283 SYN (Oct 4) LEN=40 TTL=47 ID=15828 TCP DPT=8080 WINDOW=287 SYN (Oct 3) LEN=40 TTL=47 ID=10848 TCP DPT=8080 WINDOW=35283 SYN (Oct 3) LEN=40 TTL=47 ID=12964 TCP DPT=8080 WINDOW=23298 SYN (Oct 3) LEN=40 TTL=47 ID=50388 TCP DPT=8080 WINDOW=35283 SYN (Oct 3) LEN=40 TTL=47 ID=14031 TCP DPT=8080 WINDOW=23298 SYN (Oct 2) LEN=40 TTL=47 ID=12066 TCP DPT=8080 WINDOW=35283 SYN (Oct 2) LEN=40 TTL=47 ID=50850 TCP DPT=8080 WINDOW=287 SYN (Oct 2) LEN=40 TTL=47 ID=56638 TCP DPT=8080 WINDOW=23298 SYN (Oct 2) LEN=40 TTL=47 ID=33100 TCP DPT=8080 WINDOW=287 SYN (Oct 1) LEN=40 TTL=47 ID=42434 TCP DPT=8080 WINDOW=35283 SYN (Oct 1) LEN=40 TTL=47 ID=348... |
2019-10-05 14:01:50 |
| 42.119.75.33 | attackspambots | Unauthorised access (Oct 3) SRC=42.119.75.33 LEN=40 TTL=47 ID=32612 TCP DPT=8080 WINDOW=18588 SYN Unauthorised access (Oct 2) SRC=42.119.75.33 LEN=40 TTL=47 ID=25187 TCP DPT=8080 WINDOW=18588 SYN Unauthorised access (Oct 2) SRC=42.119.75.33 LEN=40 TTL=47 ID=11213 TCP DPT=8080 WINDOW=30380 SYN Unauthorised access (Oct 2) SRC=42.119.75.33 LEN=40 TTL=47 ID=34414 TCP DPT=8080 WINDOW=61220 SYN Unauthorised access (Oct 2) SRC=42.119.75.33 LEN=40 TTL=47 ID=12385 TCP DPT=8080 WINDOW=20884 SYN Unauthorised access (Oct 2) SRC=42.119.75.33 LEN=40 TTL=47 ID=541 TCP DPT=8080 WINDOW=20884 SYN Unauthorised access (Oct 1) SRC=42.119.75.33 LEN=40 TTL=47 ID=10615 TCP DPT=8080 WINDOW=61220 SYN Unauthorised access (Oct 1) SRC=42.119.75.33 LEN=40 TTL=47 ID=34640 TCP DPT=8080 WINDOW=61220 SYN |
2019-10-03 05:49:23 |
| 42.119.75.18 | attackbots | Unauthorised access (Oct 1) SRC=42.119.75.18 LEN=40 TTL=47 ID=21481 TCP DPT=8080 WINDOW=42293 SYN Unauthorised access (Oct 1) SRC=42.119.75.18 LEN=40 TTL=47 ID=27621 TCP DPT=8080 WINDOW=13749 SYN Unauthorised access (Oct 1) SRC=42.119.75.18 LEN=40 TTL=47 ID=48053 TCP DPT=8080 WINDOW=42293 SYN Unauthorised access (Oct 1) SRC=42.119.75.18 LEN=40 TTL=47 ID=14772 TCP DPT=8080 WINDOW=7061 SYN |
2019-10-01 21:48:40 |
| 42.119.75.149 | attackspam | [portscan] Port scan |
2019-10-01 12:51:26 |
| 42.119.75.213 | attack | [portscan] tcp/23 [TELNET] *(RWIN=15867)(08041230) |
2019-08-05 00:37:29 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.119.75.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51384
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.119.75.53. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019083102 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 08:50:13 CST 2019
;; MSG SIZE rcvd: 116
Host 53.75.119.42.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 53.75.119.42.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.166.46.206 | attackspam | fail2ban honeypot |
2019-10-19 12:14:28 |
| 222.186.175.183 | attackspambots | Oct 18 23:58:54 plusreed sshd[19467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Oct 18 23:58:56 plusreed sshd[19467]: Failed password for root from 222.186.175.183 port 56570 ssh2 ... |
2019-10-19 12:03:40 |
| 180.244.9.127 | attackbotsspam | Oct 19 03:58:35 thevastnessof sshd[22128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.244.9.127 ... |
2019-10-19 12:13:10 |
| 185.239.172.210 | attack | Chat Spam |
2019-10-19 07:42:44 |
| 140.143.15.169 | attack | Oct 18 17:50:27 wbs sshd\[3032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.15.169 user=root Oct 18 17:50:30 wbs sshd\[3032\]: Failed password for root from 140.143.15.169 port 44606 ssh2 Oct 18 17:54:42 wbs sshd\[3348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.15.169 user=root Oct 18 17:54:44 wbs sshd\[3348\]: Failed password for root from 140.143.15.169 port 52924 ssh2 Oct 18 17:58:59 wbs sshd\[3685\]: Invalid user arkserver from 140.143.15.169 |
2019-10-19 12:00:37 |
| 147.135.156.89 | attackspam | Oct 18 17:53:59 php1 sshd\[28380\]: Invalid user client from 147.135.156.89 Oct 18 17:53:59 php1 sshd\[28380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip89.ip-147-135-156.eu Oct 18 17:54:01 php1 sshd\[28380\]: Failed password for invalid user client from 147.135.156.89 port 34752 ssh2 Oct 18 17:58:51 php1 sshd\[28925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip89.ip-147-135-156.eu user=sync Oct 18 17:58:54 php1 sshd\[28925\]: Failed password for sync from 147.135.156.89 port 53800 ssh2 |
2019-10-19 12:04:40 |
| 103.21.148.51 | attack | Automatic report - Banned IP Access |
2019-10-19 07:39:32 |
| 152.136.86.234 | attack | Oct 19 00:57:48 bouncer sshd\[12926\]: Invalid user muia from 152.136.86.234 port 59136 Oct 19 00:57:48 bouncer sshd\[12926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.86.234 Oct 19 00:57:49 bouncer sshd\[12926\]: Failed password for invalid user muia from 152.136.86.234 port 59136 ssh2 ... |
2019-10-19 07:55:54 |
| 23.129.64.161 | attackspam | Oct 19 05:58:34 rotator sshd\[22518\]: Failed password for root from 23.129.64.161 port 50415 ssh2Oct 19 05:58:37 rotator sshd\[22518\]: Failed password for root from 23.129.64.161 port 50415 ssh2Oct 19 05:58:40 rotator sshd\[22518\]: Failed password for root from 23.129.64.161 port 50415 ssh2Oct 19 05:58:43 rotator sshd\[22518\]: Failed password for root from 23.129.64.161 port 50415 ssh2Oct 19 05:58:45 rotator sshd\[22518\]: Failed password for root from 23.129.64.161 port 50415 ssh2Oct 19 05:58:49 rotator sshd\[22518\]: Failed password for root from 23.129.64.161 port 50415 ssh2 ... |
2019-10-19 12:06:43 |
| 80.82.64.73 | attack | Oct 19 05:54:05 mail kernel: [1170487.205042] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=80.82.64.73 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=33012 PROTO=TCP SPT=54202 DPT=42929 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 19 05:54:15 mail kernel: [1170496.580104] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=80.82.64.73 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=9883 PROTO=TCP SPT=54202 DPT=42380 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 19 05:55:10 mail kernel: [1170552.413123] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=80.82.64.73 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=51709 PROTO=TCP SPT=54202 DPT=42527 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 19 05:55:14 mail kernel: [1170555.595227] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=80.82.64.73 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=16262 PROTO=TCP SPT=54202 DPT=42421 WINDOW=1024 RES=0x00 SYN URGP=0 O |
2019-10-19 12:05:01 |
| 96.44.131.78 | attackspambots | (imapd) Failed IMAP login from 96.44.131.78 (US/United States/96.44.131.78.static.quadranet.com): 1 in the last 3600 secs |
2019-10-19 07:34:32 |
| 210.221.220.68 | attackbots | Oct 18 13:37:58 home sshd[30664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.221.220.68 user=root Oct 18 13:38:00 home sshd[30664]: Failed password for root from 210.221.220.68 port 52636 ssh2 Oct 18 13:45:10 home sshd[30719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.221.220.68 user=root Oct 18 13:45:11 home sshd[30719]: Failed password for root from 210.221.220.68 port 60209 ssh2 Oct 18 13:49:30 home sshd[30760]: Invalid user drive from 210.221.220.68 port 35143 Oct 18 13:49:30 home sshd[30760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.221.220.68 Oct 18 13:49:30 home sshd[30760]: Invalid user drive from 210.221.220.68 port 35143 Oct 18 13:49:31 home sshd[30760]: Failed password for invalid user drive from 210.221.220.68 port 35143 ssh2 Oct 18 13:53:48 home sshd[30780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=21 |
2019-10-19 07:40:48 |
| 185.129.62.62 | attackspambots | Oct 18 23:33:45 rotator sshd\[20045\]: Failed password for root from 185.129.62.62 port 48199 ssh2Oct 18 23:33:47 rotator sshd\[20045\]: Failed password for root from 185.129.62.62 port 48199 ssh2Oct 18 23:33:50 rotator sshd\[20045\]: Failed password for root from 185.129.62.62 port 48199 ssh2Oct 18 23:33:52 rotator sshd\[20045\]: Failed password for root from 185.129.62.62 port 48199 ssh2Oct 18 23:33:55 rotator sshd\[20045\]: Failed password for root from 185.129.62.62 port 48199 ssh2Oct 18 23:33:57 rotator sshd\[20045\]: Failed password for root from 185.129.62.62 port 48199 ssh2 ... |
2019-10-19 07:50:07 |
| 14.18.93.114 | attack | Invalid user laura from 14.18.93.114 port 40208 |
2019-10-19 07:54:27 |
| 205.205.150.4 | attackbotsspam | 10/18/2019-23:59:00.693131 205.205.150.4 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-19 12:00:18 |