City: unknown
Region: unknown
Country: China
Internet Service Provider: ChinaNet Henan Province Network
Hostname: unknown
Organization: unknown
Usage Type: unknown
Type | Details | Datetime |
---|---|---|
attackbots | Unauthorized connection attempt detected from IP address 106.42.99.252 to port 139 [T] |
2020-05-20 08:57:42 |
IP | Type | Details | Datetime |
---|---|---|---|
106.42.99.56 | attack | Unauthorized connection attempt detected from IP address 106.42.99.56 to port 139 [T] |
2020-05-20 08:58:01 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.42.99.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 245
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.42.99.252. IN A
;; AUTHORITY SECTION:
. 262 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020051901 1800 900 604800 86400
;; Query time: 139 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 20 08:57:37 CST 2020
;; MSG SIZE rcvd: 117
Host 252.99.42.106.in-addr.arpa not found: 2(SERVFAIL)
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 252.99.42.106.in-addr.arpa.: No answer
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
84.127.137.26 | attackspam | Jun 16 21:50:51 cumulus sshd[4022]: Bad protocol version identification '' from 84.127.137.26 port 56958 Jun 16 22:12:50 cumulus sshd[5285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.127.137.26 user=r.r Jun 16 22:12:52 cumulus sshd[5285]: Failed password for r.r from 84.127.137.26 port 46304 ssh2 Jun 16 22:12:53 cumulus sshd[5285]: Connection closed by 84.127.137.26 port 46304 [preauth] Jun 16 22:17:14 cumulus sshd[5448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.127.137.26 user=r.r Jun 16 22:17:16 cumulus sshd[5448]: Failed password for r.r from 84.127.137.26 port 34148 ssh2 Jun 16 22:22:30 cumulus sshd[5767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.127.137.26 user=r.r Jun 16 22:22:32 cumulus sshd[5767]: Failed password for r.r from 84.127.137.26 port 58554 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?i |
2019-06-22 04:33:29 |
194.156.125.75 | attackspambots | 4.122.361,91-03/02 concatform PostRequest-Spammer scoring: Durban02 |
2019-06-22 04:28:06 |
154.223.171.112 | attackbotsspam | 445/tcp [2019-06-21]1pkt |
2019-06-22 04:41:58 |
191.37.128.83 | attack | Request: "GET / HTTP/1.1" |
2019-06-22 04:39:09 |
61.148.29.198 | attack | $f2bV_matches |
2019-06-22 04:49:49 |
177.33.139.26 | attackspam | ¯\_(ツ)_/¯ |
2019-06-22 04:36:09 |
2.179.210.79 | attack | Request: "GET / HTTP/1.1" |
2019-06-22 04:59:10 |
186.193.21.155 | attackspambots | 445/tcp [2019-06-21]1pkt |
2019-06-22 04:45:17 |
212.36.9.245 | attackspambots | Request: "GET / HTTP/1.1" |
2019-06-22 05:09:20 |
185.161.115.146 | attack | Request: "GET / HTTP/1.1" |
2019-06-22 04:38:15 |
64.180.64.240 | attackspam | Hit on /wp-login.php |
2019-06-22 04:53:32 |
93.174.93.48 | attackspambots | Jun 21 20:51:27 MK-Soft-VM5 sshd\[28512\]: Invalid user services from 93.174.93.48 port 57632 Jun 21 20:51:27 MK-Soft-VM5 sshd\[28512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.174.93.48 Jun 21 20:51:29 MK-Soft-VM5 sshd\[28512\]: Failed password for invalid user services from 93.174.93.48 port 57632 ssh2 ... |
2019-06-22 05:06:26 |
123.14.108.22 | attackspambots | Bad Request: "GET / HTTP/1.0" |
2019-06-22 05:08:28 |
62.197.120.198 | attack | $f2bV_matches |
2019-06-22 05:00:47 |
117.223.162.42 | attack | 23/tcp [2019-06-21]1pkt |
2019-06-22 04:51:49 |