城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 61.142.20.29 | attackspam | (ftpd) Failed FTP login from 61.142.20.29 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 8 08:47:08 ir1 pure-ftpd: (?@61.142.20.29) [WARNING] Authentication failed for user [anonymous] |
2020-06-08 16:59:07 |
| 61.142.20.30 | attackbots | Port scan on 1 port(s): 1433 |
2020-06-08 14:34:18 |
| 61.142.20.46 | attackspambots | IP reached maximum auth failures |
2020-06-08 13:21:11 |
| 61.142.20.34 | attack | Brute forcing RDP port 3389 |
2020-05-13 12:59:00 |
| 61.142.208.100 | attackbots | Unauthorized connection attempt from IP address 61.142.208.100 on Port 445(SMB) |
2020-03-03 06:53:43 |
| 61.142.20.2 | attack | Scanning |
2019-12-26 19:39:45 |
| 61.142.20.29 | attack | 1433/tcp 1433/tcp 1433/tcp... [2019-11-28/12-08]4pkt,1pt.(tcp) |
2019-12-09 06:59:44 |
| 61.142.20.6 | attackbotsspam | Automatic report - FTP Brute Force |
2019-12-05 22:49:14 |
| 61.142.20.16 | attackspam | Automatic report - Banned IP Access |
2019-11-27 15:03:41 |
| 61.142.20.29 | attackspambots | Automatic report - Port Scan Attack |
2019-11-13 20:18:18 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.142.20.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33060
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.142.20.41. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 03:53:36 CST 2025
;; MSG SIZE rcvd: 105
Host 41.20.142.61.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 41.20.142.61.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.52.89 | attackspam | Sep 24 10:26:47 server2 sshd\[23735\]: User root from 222.186.52.89 not allowed because not listed in AllowUsers Sep 24 10:30:05 server2 sshd\[23867\]: User root from 222.186.52.89 not allowed because not listed in AllowUsers Sep 24 10:30:12 server2 sshd\[24053\]: User root from 222.186.52.89 not allowed because not listed in AllowUsers Sep 24 10:30:14 server2 sshd\[24055\]: User root from 222.186.52.89 not allowed because not listed in AllowUsers Sep 24 10:30:16 server2 sshd\[24057\]: User root from 222.186.52.89 not allowed because not listed in AllowUsers Sep 24 10:30:36 server2 sshd\[24062\]: User root from 222.186.52.89 not allowed because not listed in AllowUsers |
2019-09-24 15:41:56 |
| 129.204.42.58 | attackbotsspam | Sep 24 00:31:47 ny01 sshd[27948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.42.58 Sep 24 00:31:49 ny01 sshd[27948]: Failed password for invalid user teamspeak3 from 129.204.42.58 port 33708 ssh2 Sep 24 00:40:13 ny01 sshd[29582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.42.58 |
2019-09-24 15:54:35 |
| 206.189.130.251 | attack | Sep 24 07:48:20 game-panel sshd[29273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.251 Sep 24 07:48:22 game-panel sshd[29273]: Failed password for invalid user alfred from 206.189.130.251 port 39580 ssh2 Sep 24 07:53:04 game-panel sshd[29446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.251 |
2019-09-24 16:04:23 |
| 51.91.37.197 | attackspam | Sep 24 10:10:22 vps01 sshd[17433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.37.197 Sep 24 10:10:24 vps01 sshd[17433]: Failed password for invalid user ftpuser from 51.91.37.197 port 38044 ssh2 |
2019-09-24 16:15:29 |
| 51.38.232.52 | attackbots | Invalid user dujoey from 51.38.232.52 port 34299 |
2019-09-24 16:12:18 |
| 54.37.155.165 | attack | Sep 24 09:51:13 MK-Soft-VM4 sshd[17638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.155.165 Sep 24 09:51:16 MK-Soft-VM4 sshd[17638]: Failed password for invalid user 123 from 54.37.155.165 port 36012 ssh2 ... |
2019-09-24 15:59:05 |
| 210.245.33.77 | attackspambots | Sep 24 09:24:18 host sshd\[4720\]: Invalid user munin from 210.245.33.77 port 21052 Sep 24 09:24:18 host sshd\[4720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.33.77 ... |
2019-09-24 16:05:54 |
| 188.214.255.241 | attack | Sep 24 04:11:43 www_kotimaassa_fi sshd[20905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.214.255.241 Sep 24 04:11:45 www_kotimaassa_fi sshd[20905]: Failed password for invalid user wesley from 188.214.255.241 port 40532 ssh2 ... |
2019-09-24 15:53:46 |
| 139.199.82.171 | attackspam | $f2bV_matches |
2019-09-24 15:56:29 |
| 183.102.114.59 | attackspam | Sep 23 21:54:59 hiderm sshd\[12403\]: Invalid user nagios5 from 183.102.114.59 Sep 23 21:54:59 hiderm sshd\[12403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.102.114.59 Sep 23 21:55:02 hiderm sshd\[12403\]: Failed password for invalid user nagios5 from 183.102.114.59 port 45534 ssh2 Sep 23 21:59:35 hiderm sshd\[12837\]: Invalid user tf from 183.102.114.59 Sep 23 21:59:35 hiderm sshd\[12837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.102.114.59 |
2019-09-24 16:00:38 |
| 177.135.93.227 | attackspambots | Sep 24 03:40:40 TORMINT sshd\[28482\]: Invalid user noc from 177.135.93.227 Sep 24 03:40:40 TORMINT sshd\[28482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.93.227 Sep 24 03:40:41 TORMINT sshd\[28482\]: Failed password for invalid user noc from 177.135.93.227 port 39420 ssh2 ... |
2019-09-24 15:49:36 |
| 103.69.20.47 | attackspam | postfix |
2019-09-24 15:46:16 |
| 223.145.137.169 | attackspambots | Unauthorised access (Sep 24) SRC=223.145.137.169 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=24915 TCP DPT=8080 WINDOW=1516 SYN |
2019-09-24 16:16:19 |
| 185.66.213.64 | attack | Sep 23 20:20:51 php1 sshd\[15729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.66.213.64 user=root Sep 23 20:20:53 php1 sshd\[15729\]: Failed password for root from 185.66.213.64 port 51742 ssh2 Sep 23 20:25:08 php1 sshd\[16094\]: Invalid user Irina from 185.66.213.64 Sep 23 20:25:08 php1 sshd\[16094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.66.213.64 Sep 23 20:25:10 php1 sshd\[16094\]: Failed password for invalid user Irina from 185.66.213.64 port 35698 ssh2 |
2019-09-24 15:55:16 |
| 111.230.241.90 | attackbotsspam | Sep 23 23:31:32 lanister sshd[2592]: Failed password for invalid user yd from 111.230.241.90 port 54648 ssh2 Sep 23 23:49:53 lanister sshd[2818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.241.90 user=root Sep 23 23:49:55 lanister sshd[2818]: Failed password for root from 111.230.241.90 port 59676 ssh2 Sep 23 23:53:06 lanister sshd[2827]: Invalid user quiromeu from 111.230.241.90 ... |
2019-09-24 16:20:07 |