City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.37.74.142 | attack | 19217/tcp 20797/tcp 6346/tcp... [2020-07-26/09-25]12pkt,11pt.(tcp) |
2020-09-25 20:10:19 |
| 106.37.74.142 | attackbotsspam | $f2bV_matches |
2020-08-01 15:35:28 |
| 106.37.74.142 | attackbotsspam | Invalid user appserver from 106.37.74.142 port 47211 |
2020-07-31 16:03:12 |
| 106.37.74.142 | attackspam | (sshd) Failed SSH login from 106.37.74.142 (CN/China/142.74.37.106.static.bjtelecom.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 25 10:12:31 s1 sshd[6159]: Invalid user csgoserver from 106.37.74.142 port 50186 Jul 25 10:12:33 s1 sshd[6159]: Failed password for invalid user csgoserver from 106.37.74.142 port 50186 ssh2 Jul 25 10:36:41 s1 sshd[6830]: Invalid user ep from 106.37.74.142 port 50380 Jul 25 10:36:42 s1 sshd[6830]: Failed password for invalid user ep from 106.37.74.142 port 50380 ssh2 Jul 25 10:45:50 s1 sshd[7060]: Invalid user ap from 106.37.74.142 port 57825 |
2020-07-25 16:51:55 |
| 106.37.74.142 | attackbots | Bruteforce detected by fail2ban |
2020-07-23 19:23:24 |
| 106.37.74.142 | attack | " " |
2020-07-20 02:54:17 |
| 106.37.74.142 | attack | Invalid user user from 106.37.74.142 port 51541 |
2020-07-18 23:21:02 |
| 106.37.74.142 | attackbotsspam | Exploited Host. |
2020-07-16 06:00:15 |
| 106.37.74.142 | attackspambots | Jul 8 00:24:26 mail sshd[50885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.74.142 Jul 8 00:24:27 mail sshd[50885]: Failed password for invalid user vlas from 106.37.74.142 port 55862 ssh2 ... |
2020-07-08 06:25:54 |
| 106.37.74.142 | attack | Jul 7 11:59:05 webhost01 sshd[23524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.74.142 Jul 7 11:59:07 webhost01 sshd[23524]: Failed password for invalid user andreas from 106.37.74.142 port 60521 ssh2 ... |
2020-07-07 16:21:22 |
| 106.37.74.142 | attackbots | Jun 15 22:59:25 dhoomketu sshd[772706]: Invalid user lubuntu from 106.37.74.142 port 38166 Jun 15 22:59:25 dhoomketu sshd[772706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.74.142 Jun 15 22:59:25 dhoomketu sshd[772706]: Invalid user lubuntu from 106.37.74.142 port 38166 Jun 15 22:59:28 dhoomketu sshd[772706]: Failed password for invalid user lubuntu from 106.37.74.142 port 38166 ssh2 Jun 15 23:03:29 dhoomketu sshd[772814]: Invalid user rafael from 106.37.74.142 port 56121 ... |
2020-06-16 01:45:51 |
| 106.37.74.142 | attackspambots | Apr 20 05:51:05 haigwepa sshd[25906]: Failed password for root from 106.37.74.142 port 46386 ssh2 Apr 20 05:55:19 haigwepa sshd[26193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.74.142 ... |
2020-04-20 16:22:05 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.37.74.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.37.74.121. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 01:42:31 CST 2022
;; MSG SIZE rcvd: 106
121.74.37.106.in-addr.arpa domain name pointer 121.74.37.106.static.bjtelecom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
121.74.37.106.in-addr.arpa name = 121.74.37.106.static.bjtelecom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 115.159.190.174 | attack | Jul 23 01:07:53 ns382633 sshd\[28472\]: Invalid user hardeep from 115.159.190.174 port 47354 Jul 23 01:07:53 ns382633 sshd\[28472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.190.174 Jul 23 01:07:55 ns382633 sshd\[28472\]: Failed password for invalid user hardeep from 115.159.190.174 port 47354 ssh2 Jul 23 01:18:59 ns382633 sshd\[30331\]: Invalid user mysql1 from 115.159.190.174 port 52870 Jul 23 01:18:59 ns382633 sshd\[30331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.190.174 |
2020-07-23 07:27:26 |
| 222.186.175.154 | attackbotsspam | Jul 23 00:57:58 vps639187 sshd\[21073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root Jul 23 00:58:00 vps639187 sshd\[21073\]: Failed password for root from 222.186.175.154 port 23486 ssh2 Jul 23 00:58:03 vps639187 sshd\[21073\]: Failed password for root from 222.186.175.154 port 23486 ssh2 ... |
2020-07-23 07:01:18 |
| 106.13.171.12 | attackbotsspam | Jul 23 01:55:35 root sshd[11710]: Invalid user gitlab-runner from 106.13.171.12 ... |
2020-07-23 07:02:46 |
| 222.186.175.216 | attackspambots | Jul 23 00:55:26 srv-ubuntu-dev3 sshd[89315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root Jul 23 00:55:28 srv-ubuntu-dev3 sshd[89315]: Failed password for root from 222.186.175.216 port 21952 ssh2 Jul 23 00:55:32 srv-ubuntu-dev3 sshd[89315]: Failed password for root from 222.186.175.216 port 21952 ssh2 Jul 23 00:55:26 srv-ubuntu-dev3 sshd[89315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root Jul 23 00:55:28 srv-ubuntu-dev3 sshd[89315]: Failed password for root from 222.186.175.216 port 21952 ssh2 Jul 23 00:55:32 srv-ubuntu-dev3 sshd[89315]: Failed password for root from 222.186.175.216 port 21952 ssh2 Jul 23 00:55:26 srv-ubuntu-dev3 sshd[89315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root Jul 23 00:55:28 srv-ubuntu-dev3 sshd[89315]: Failed password for root from 222.186.175.216 p ... |
2020-07-23 06:57:27 |
| 212.20.56.138 | attackspam | Failed RDP login |
2020-07-23 07:16:18 |
| 218.92.0.224 | attackspambots | Jul 22 23:55:29 rocket sshd[2531]: Failed password for root from 218.92.0.224 port 61306 ssh2 Jul 22 23:55:43 rocket sshd[2531]: Failed password for root from 218.92.0.224 port 61306 ssh2 Jul 22 23:55:43 rocket sshd[2531]: error: maximum authentication attempts exceeded for root from 218.92.0.224 port 61306 ssh2 [preauth] ... |
2020-07-23 06:56:46 |
| 36.81.143.217 | attackbots | Failed RDP login |
2020-07-23 07:22:50 |
| 5.45.64.13 | attack | Failed RDP login |
2020-07-23 07:15:50 |
| 51.222.12.106 | attackbots | 2020-07-22T23:14:34.688126shield sshd\[10304\]: Invalid user amy from 51.222.12.106 port 41006 2020-07-22T23:14:34.698125shield sshd\[10304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-f6e8217e.vps.ovh.ca 2020-07-22T23:14:36.683190shield sshd\[10304\]: Failed password for invalid user amy from 51.222.12.106 port 41006 ssh2 2020-07-22T23:22:14.295231shield sshd\[12392\]: Invalid user run from 51.222.12.106 port 55494 2020-07-22T23:22:14.303749shield sshd\[12392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-f6e8217e.vps.ovh.ca |
2020-07-23 07:36:12 |
| 116.247.81.99 | attackspam | Jul 23 00:55:23 vps647732 sshd[19990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.99 Jul 23 00:55:25 vps647732 sshd[19990]: Failed password for invalid user deploy from 116.247.81.99 port 37298 ssh2 ... |
2020-07-23 07:14:58 |
| 113.179.152.71 | attackbotsspam | Failed RDP login |
2020-07-23 07:17:35 |
| 193.176.215.26 | attackbots | Failed RDP login |
2020-07-23 07:29:10 |
| 118.174.139.118 | attackbots | Jul 22 22:55:25 scw-6657dc sshd[3628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.139.118 Jul 22 22:55:25 scw-6657dc sshd[3628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.139.118 Jul 22 22:55:28 scw-6657dc sshd[3628]: Failed password for invalid user loop from 118.174.139.118 port 52026 ssh2 ... |
2020-07-23 07:09:33 |
| 118.25.27.67 | attackbotsspam | Jul 23 00:55:27 ns381471 sshd[20300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.67 Jul 23 00:55:29 ns381471 sshd[20300]: Failed password for invalid user wkidup from 118.25.27.67 port 55242 ssh2 |
2020-07-23 07:08:03 |
| 93.38.114.55 | attack | Invalid user board from 93.38.114.55 port 36501 |
2020-07-23 07:25:17 |