City: unknown
Region: unknown
Country: China
Internet Service Provider: China Mobile Communications Corporation
Hostname: unknown
Organization: unknown
Usage Type: unknown
Type | Details | Datetime |
---|---|---|
attack | Automatic report - Port Scan Attack |
2019-12-11 13:17:16 |
IP | Type | Details | Datetime |
---|---|---|---|
111.42.102.79 | attackspam | User agent spoofing, Connecting to IP instead of domain name, Page: /HNAP1/ |
2020-05-07 01:14:37 |
111.42.102.67 | attackspambots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-04-25 03:32:16 |
111.42.102.127 | attackspambots | GPON Home Routers Remote Code Execution Vulnerability |
2020-04-02 05:51:06 |
111.42.102.153 | attackbots | Unauthorized connection attempt detected from IP address 111.42.102.153 to port 2323 [J] |
2020-01-23 00:28:39 |
111.42.102.142 | attack | unauthorized connection attempt |
2020-01-09 17:44:14 |
111.42.102.65 | attack | Unauthorized connection attempt detected from IP address 111.42.102.65 to port 23 [T] |
2020-01-09 01:59:28 |
111.42.102.128 | attackspam | Jan 5 22:51:44 debian-2gb-nbg1-2 kernel: \[520425.417666\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=111.42.102.128 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0xE0 TTL=49 ID=36552 PROTO=TCP SPT=1600 DPT=23 WINDOW=57023 RES=0x00 SYN URGP=0 |
2020-01-06 05:54:28 |
111.42.102.129 | attackbots | Honeypot attack, port: 23, PTR: PTR record not found |
2020-01-05 00:45:19 |
111.42.102.81 | attackbots | Dec 26 15:50:33 h2177944 kernel: \[570559.418076\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40763 DF PROTO=TCP SPT=33462 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 Dec 26 15:50:33 h2177944 kernel: \[570559.418089\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40763 DF PROTO=TCP SPT=33462 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 Dec 26 15:50:36 h2177944 kernel: \[570562.569922\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40764 DF PROTO=TCP SPT=33462 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 Dec 26 15:50:36 h2177944 kernel: \[570562.569936\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=48 ID=40764 DF PROTO=TCP SPT=33462 DPT=23 WINDOW=5840 RES=0x00 SYN URGP=0 Dec 26 15:50:43 h2177944 kernel: \[570568.878485\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=111.42.102.81 DST=85.214.117.9 LEN= |
2019-12-27 03:21:44 |
111.42.102.134 | attack | 5060/udp [2019-12-13]1pkt |
2019-12-14 00:53:02 |
111.42.102.140 | attackspam | 23/tcp [2019-12-12]1pkt |
2019-12-13 00:29:39 |
111.42.102.74 | attack | Mirai and Reaper Exploitation Traffic |
2019-11-23 05:19:47 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.42.102.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;111.42.102.145. IN A
;; AUTHORITY SECTION:
. 522 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019121002 1800 900 604800 86400
;; Query time: 143 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 13:17:10 CST 2019
;; MSG SIZE rcvd: 118
Host 145.102.42.111.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server: 100.100.2.138
Address: 100.100.2.138#53
** server can't find 145.102.42.111.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
222.65.250.250 | attack | Sep 6 07:05:07 root sshd[27216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.65.250.250 Sep 6 07:05:09 root sshd[27216]: Failed password for invalid user secretariat from 222.65.250.250 port 36960 ssh2 ... |
2020-09-06 14:08:10 |
192.3.204.194 | attackbots | scanning for potential vulnerable apps (wordpress etc.) and database accesses. Requested URI: /wp/wp-admin/ |
2020-09-06 14:21:34 |
88.214.26.90 | attackbots | SSH Bruteforce Attempt on Honeypot |
2020-09-06 14:28:16 |
170.253.26.182 | attackbotsspam | Unauthorised access (Sep 5) SRC=170.253.26.182 LEN=44 TTL=52 ID=56329 TCP DPT=23 WINDOW=47326 SYN |
2020-09-06 13:56:47 |
154.220.96.130 | attackbots | 2020-09-05T15:41:31.859573correo.[domain] sshd[24744]: Failed password for root from 154.220.96.130 port 41072 ssh2 2020-09-05T15:41:34.499858correo.[domain] sshd[24744]: Failed password for root from 154.220.96.130 port 41072 ssh2 2020-09-05T15:41:36.083539correo.[domain] sshd[24744]: Failed password for root from 154.220.96.130 port 41072 ssh2 ... |
2020-09-06 14:23:26 |
103.111.69.237 | attack | Brute Force |
2020-09-06 14:05:25 |
51.91.132.52 | attackbots | failed attempts to inject php and access /.env |
2020-09-06 14:12:24 |
185.220.103.6 | attack | 185.220.103.6 (DE/Germany/karensilkwood.tor-exit.calyxinstitute.org), 3 distributed sshd attacks on account [admin] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 6 01:25:48 internal2 sshd[13385]: Invalid user admin from 185.220.103.6 port 51312 Sep 6 01:25:15 internal2 sshd[13025]: Invalid user admin from 185.220.102.248 port 9788 Sep 6 01:25:17 internal2 sshd[13040]: Invalid user admin from 185.220.102.248 port 3366 IP Addresses Blocked: |
2020-09-06 14:31:48 |
192.241.231.91 | attackbots | Unauthorized SSH login attempts |
2020-09-06 14:07:06 |
45.142.120.147 | attack | (smtpauth) Failed SMTP AUTH login from 45.142.120.147 (RU/Russia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-09-06 01:45:34 dovecot_login authenticator failed for (User) [45.142.120.147]:29238: 535 Incorrect authentication data (set_id=dump@xeoserver.com) 2020-09-06 01:45:43 dovecot_login authenticator failed for (User) [45.142.120.147]:62486: 535 Incorrect authentication data (set_id=dump@xeoserver.com) 2020-09-06 01:45:43 dovecot_login authenticator failed for (User) [45.142.120.147]:26682: 535 Incorrect authentication data (set_id=dump@xeoserver.com) 2020-09-06 01:45:44 dovecot_login authenticator failed for (User) [45.142.120.147]:42296: 535 Incorrect authentication data (set_id=minneapolis@xeoserver.com) 2020-09-06 01:46:00 dovecot_login authenticator failed for (User) [45.142.120.147]:12748: 535 Incorrect authentication data (set_id=minneapolis@xeoserver.com) |
2020-09-06 13:58:41 |
177.139.51.246 | attack | 1599324607 - 09/05/2020 18:50:07 Host: 177.139.51.246/177.139.51.246 Port: 445 TCP Blocked |
2020-09-06 14:25:44 |
67.205.135.65 | attack |
|
2020-09-06 14:06:22 |
81.213.219.171 | attackspam | Automatic report - Port Scan Attack |
2020-09-06 14:13:27 |
82.64.83.141 | attack | Sep 6 02:18:58 ws26vmsma01 sshd[21482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.83.141 ... |
2020-09-06 14:33:54 |
51.75.64.187 | attackspambots | Brute forcing email accounts |
2020-09-06 14:30:26 |