City: unknown
Region: unknown
Country: China
Internet Service Provider: ChinaNet Guangdong Province Network
Hostname: unknown
Organization: unknown
Usage Type: unknown
Type | Details | Datetime |
---|---|---|
attackbotsspam | 06/24/2020-08:04:04.388181 113.106.11.107 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-06-25 01:57:16 |
attack | 01/10/2020-05:50:39.081997 113.106.11.107 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-01-10 18:07:42 |
attackspam | port scan and connect, tcp 1433 (ms-sql-s) |
2019-11-04 02:05:40 |
IP | Type | Details | Datetime |
---|---|---|---|
113.106.11.6 | attack | Unauthorized connection attempt detected from IP address 113.106.11.6 to port 1433 [T] |
2020-08-29 21:35:39 |
113.106.11.57 | attackspam | Jun 16 21:38:59 mail postfix/postscreen[12153]: DNSBL rank 4 for [113.106.11.57]:57126 ... |
2020-06-29 04:56:05 |
113.106.11.57 | attackspambots | May 4 15:49:18 WHD8 postfix/smtpd\[84088\]: warning: unknown\[113.106.11.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 4 15:49:27 WHD8 postfix/smtpd\[84092\]: warning: unknown\[113.106.11.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 4 15:49:40 WHD8 postfix/smtpd\[84088\]: warning: unknown\[113.106.11.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-06 04:40:06 |
113.106.11.116 | attackspambots | DATE:2020-04-05 14:45:40, IP:113.106.11.116, PORT:3306 SQL brute force auth on honeypot MySQL/MariaDB server (honey-neo-dc) |
2020-04-05 20:52:43 |
113.106.11.57 | spamattack | [2020/03/11 00:16:17] [113.106.11.57:2104-0] User test@luxnetcorp.com.tw AUTH fails. [2020/03/11 00:17:47] [113.106.11.57:2095-0] User test@luxnetcorp.com.tw AUTH fails. [2020/03/11 00:18:19] [113.106.11.57:2101-0] User test@luxnetcorp.com.tw AUTH fails. [2020/03/11 00:18:26] [113.106.11.57:2105-0] User test@luxnetcorp.com.tw AUTH fails. [2020/03/11 00:18:27] [113.106.11.57:2102-0] User test@luxnetcorp.com.tw AUTH fails. |
2020-03-11 08:30:26 |
113.106.11.116 | attack | 3306/tcp [2020-03-08]1pkt |
2020-03-09 08:30:46 |
113.106.11.57 | spambotsattack | [2020/02/26 00:08:02] [113.106.11.57:2098-0] User test@luxnetcorp.com.tw AUTH fails. [2020/02/26 00:08:04] [113.106.11.57:2095-0] User test@luxnetcorp.com.tw AUTH fails. [2020/02/26 00:08:05] [113.106.11.57:2103-0] User test@luxnetcorp.com.tw AUTH fails. [2020/02/26 00:08:07] [113.106.11.57:2102-0] User test@luxnetcorp.com.tw AUTH fails. [2020/02/26 00:08:15] [113.106.11.57:2100-0] User test@luxnetcorp.com.tw AUTH fails. |
2020-02-26 09:17:17 |
113.106.11.57 | attackspam | firewall-block, port(s): 25/tcp |
2020-02-25 05:08:17 |
113.106.11.6 | attackbots | Unauthorized connection attempt detected from IP address 113.106.11.6 to port 1433 [J] |
2020-01-19 08:29:42 |
113.106.11.6 | attackbotsspam | Port 1433 Scan |
2019-12-19 07:10:39 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.106.11.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.106.11.107. IN A
;; AUTHORITY SECTION:
. 520 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019110301 1800 900 604800 86400
;; Query time: 137 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 04 02:05:36 CST 2019
;; MSG SIZE rcvd: 118
Host 107.11.106.113.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 107.11.106.113.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
190.250.51.104 | attackbotsspam | Port Scan: TCP/2323 |
2019-09-14 11:32:58 |
42.233.244.120 | attackspam | Port Scan: TCP/23 |
2019-09-14 11:26:59 |
50.63.162.149 | attackspam | Port Scan: TCP/445 |
2019-09-14 10:58:22 |
182.108.17.167 | attackspam | Port Scan: TCP/25 |
2019-09-14 11:34:32 |
46.48.22.102 | attackspambots | Port Scan: TCP/445 |
2019-09-14 11:26:18 |
181.90.79.31 | attackbotsspam | Port Scan: TCP/23 |
2019-09-14 11:04:41 |
66.170.47.242 | attackspam | Port Scan: TCP/135 |
2019-09-14 10:54:45 |
34.67.179.53 | attackspambots | Port Scan: TCP/443 |
2019-09-14 10:59:57 |
160.20.182.104 | attack | Port Scan: TCP/22 |
2019-09-14 11:09:35 |
180.76.235.100 | attackbots | Port Scan: TCP/80 |
2019-09-14 11:05:11 |
121.234.4.9 | attackbots | Port Scan: TCP/23 |
2019-09-14 11:11:57 |
96.85.230.91 | attack | Port Scan: UDP/80 |
2019-09-14 11:41:54 |
114.38.39.99 | attackbots | Port Scan: TCP/23 |
2019-09-14 11:38:35 |
200.84.172.57 | attack | Port Scan: TCP/23 |
2019-09-14 11:02:18 |
113.233.18.68 | attack | Port Scan: TCP/23 |
2019-09-14 11:39:06 |