City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.80.139.186 | attackbotsspam | Unauthorized connection attempt detected from IP address 112.80.139.186 to port 8118 [J] |
2020-03-02 16:46:43 |
| 112.80.139.72 | attackspam | The IP has triggered Cloudflare WAF. CF-Ray: 5430ed179f239666 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/4.054101423 Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-12 00:47:55 |
| 112.80.139.237 | attackspam | The IP has triggered Cloudflare WAF. CF-Ray: 5415a92e09326bf6 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-08 06:55:56 |
| 112.80.139.252 | attackspambots | The IP has triggered Cloudflare WAF. CF-Ray: 5413c84ba8846d04 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.066704189 Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-08 02:00:28 |
| 112.80.139.3 | attack | The IP has triggered Cloudflare WAF. CF-Ray: 5410ce0509096bc6 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.084743666 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-08 00:41:24 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.80.139.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46807
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.80.139.2. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:41:27 CST 2022
;; MSG SIZE rcvd: 105
Host 2.139.80.112.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 2.139.80.112.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.173.226 | attackspambots | 2020-02-20T06:54:33.008854scmdmz1 sshd[31397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226 user=root 2020-02-20T06:54:35.688924scmdmz1 sshd[31397]: Failed password for root from 222.186.173.226 port 31716 ssh2 2020-02-20T06:54:38.799244scmdmz1 sshd[31397]: Failed password for root from 222.186.173.226 port 31716 ssh2 2020-02-20T06:54:33.008854scmdmz1 sshd[31397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226 user=root 2020-02-20T06:54:35.688924scmdmz1 sshd[31397]: Failed password for root from 222.186.173.226 port 31716 ssh2 2020-02-20T06:54:38.799244scmdmz1 sshd[31397]: Failed password for root from 222.186.173.226 port 31716 ssh2 2020-02-20T06:54:36.990276scmdmz1 sshd[31399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226 user=root 2020-02-20T06:54:38.882940scmdmz1 sshd[31399]: Failed password for root from 222.186.173.226 port 5288 |
2020-02-20 13:55:02 |
| 121.15.2.178 | attackbots | Feb 20 05:56:15 |
2020-02-20 13:53:05 |
| 176.113.115.201 | attackspam | Feb 20 06:35:07 h2177944 kernel: \[5374773.749341\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.115.201 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=48898 PROTO=TCP SPT=48016 DPT=22720 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 20 06:35:07 h2177944 kernel: \[5374773.749357\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.115.201 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=48898 PROTO=TCP SPT=48016 DPT=22720 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 20 06:47:35 h2177944 kernel: \[5375522.306037\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.115.201 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=62355 PROTO=TCP SPT=48016 DPT=10144 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 20 06:47:35 h2177944 kernel: \[5375522.306051\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.115.201 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=62355 PROTO=TCP SPT=48016 DPT=10144 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 20 07:09:22 h2177944 kernel: \[5376828.281769\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.115.201 DS |
2020-02-20 14:09:55 |
| 36.90.50.85 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-20 14:01:42 |
| 185.176.27.254 | attackspambots | 02/20/2020-00:36:54.972158 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-20 13:43:56 |
| 59.95.116.125 | attackspambots | Unauthorized connection attempt from IP address 59.95.116.125 on Port 445(SMB) |
2020-02-20 13:53:44 |
| 180.76.150.17 | attackbots | Feb 20 10:25:46 areeb-Workstation sshd[7524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.150.17 Feb 20 10:25:48 areeb-Workstation sshd[7524]: Failed password for invalid user john from 180.76.150.17 port 46074 ssh2 ... |
2020-02-20 14:23:33 |
| 157.230.2.208 | attack | Feb 20 07:53:24 server sshd\[20575\]: Invalid user proxy from 157.230.2.208 Feb 20 07:53:24 server sshd\[20575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208 Feb 20 07:53:25 server sshd\[20575\]: Failed password for invalid user proxy from 157.230.2.208 port 36948 ssh2 Feb 20 07:56:11 server sshd\[21448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208 user=uucp Feb 20 07:56:13 server sshd\[21448\]: Failed password for uucp from 157.230.2.208 port 56564 ssh2 ... |
2020-02-20 13:56:41 |
| 211.72.239.34 | attack | Feb 20 07:00:40 plex sshd[3964]: Invalid user postgres from 211.72.239.34 port 43654 |
2020-02-20 14:11:46 |
| 162.243.133.165 | attackspam | " " |
2020-02-20 14:20:50 |
| 115.72.121.195 | attackbots | Honeypot attack, port: 81, PTR: adsl.viettel.vn. |
2020-02-20 14:11:28 |
| 112.246.8.49 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-02-20 14:16:57 |
| 203.218.51.167 | attack | Honeypot attack, port: 5555, PTR: pcd261167.netvigator.com. |
2020-02-20 14:24:36 |
| 83.149.44.187 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-20 14:16:05 |
| 42.159.92.93 | attackspam | Feb 20 01:56:14 vps46666688 sshd[6322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.92.93 Feb 20 01:56:16 vps46666688 sshd[6322]: Failed password for invalid user at from 42.159.92.93 port 36038 ssh2 ... |
2020-02-20 13:54:06 |