City: Sheung Shui
Region: North New Territories
Country: Hong Kong
Internet Service Provider: CSL Limited
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
113.254.208.242 | attackbots | Port probing on unauthorized port 5555 |
2020-08-18 03:24:56 |
113.254.230.153 | attack | Aug 10 18:05:12 host-itldc-nl sshd[37222]: User root from 113.254.230.153 not allowed because not listed in AllowUsers Aug 11 02:24:33 host-itldc-nl sshd[58084]: User root from 113.254.230.153 not allowed because not listed in AllowUsers Aug 11 02:24:46 host-itldc-nl sshd[59004]: Invalid user support from 113.254.230.153 port 48578 ... |
2020-08-11 08:36:30 |
113.254.2.169 | attackspambots | 20/7/11@08:00:51: FAIL: IoT-Telnet address from=113.254.2.169 ... |
2020-07-11 21:46:33 |
113.254.230.114 | attack | 1593489344 - 06/30/2020 05:55:44 Host: 113.254.230.114/113.254.230.114 Port: 445 TCP Blocked |
2020-06-30 13:13:03 |
113.254.242.46 | attackspambots | Invalid user admin from 113.254.242.46 port 59610 |
2020-05-22 03:36:49 |
113.254.250.30 | attackbots | 1584369791 - 03/16/2020 21:43:11 Host: 30-250-254-113-on-nets.com/113.254.250.30 Port: 23 TCP Blocked ... |
2020-03-17 01:36:46 |
113.254.206.210 | attack | Honeypot attack, port: 5555, PTR: 210-206-254-113-on-nets.com. |
2020-03-08 22:04:39 |
113.254.249.236 | attack | Sat Mar 7 15:08:32 2020 - Child process 400040 handling connection Sat Mar 7 15:08:32 2020 - New connection from: 113.254.249.236:32809 Sat Mar 7 15:08:32 2020 - Sending data to client: [Login: ] Sat Mar 7 15:09:03 2020 - Child aborting Sat Mar 7 15:09:03 2020 - Reporting IP address: 113.254.249.236 - mflag: 0 |
2020-03-08 07:46:56 |
113.254.26.42 | attack | 1583241588 - 03/03/2020 14:19:48 Host: 113.254.26.42/113.254.26.42 Port: 445 TCP Blocked |
2020-03-04 05:48:46 |
113.254.241.130 | attackspam | Port probing on unauthorized port 5555 |
2020-03-01 17:11:10 |
113.254.250.253 | attackbots | Fail2Ban Ban Triggered |
2020-02-18 21:47:14 |
113.254.226.210 | attack | Port probing on unauthorized port 23 |
2020-02-09 20:41:25 |
113.254.236.78 | attackspam | unauthorized connection attempt |
2020-02-07 14:24:09 |
113.254.205.14 | attackspam | Honeypot attack, port: 5555, PTR: 14-205-254-113-on-nets.com. |
2020-01-26 23:40:06 |
113.254.247.74 | attackspambots | unauthorized connection attempt |
2020-01-17 17:45:53 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.254.2.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21455
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;113.254.2.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025032900 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 29 17:44:08 CST 2025
;; MSG SIZE rcvd: 105
40.2.254.113.in-addr.arpa domain name pointer 40-2-254-113-on-nets.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.2.254.113.in-addr.arpa name = 40-2-254-113-on-nets.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
87.251.74.18 | attackbotsspam | Unauthorized connection attempt from IP address 87.251.74.18 on Port 3389(RDP) |
2020-06-22 15:46:34 |
113.22.20.168 | attack | 1592797864 - 06/22/2020 05:51:04 Host: 113.22.20.168/113.22.20.168 Port: 445 TCP Blocked |
2020-06-22 16:18:39 |
103.108.159.94 | attack | SSH Scan |
2020-06-22 15:51:51 |
207.253.29.91 | attackbotsspam | Jun 22 06:21:35 scw-6657dc sshd[16449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.253.29.91 Jun 22 06:21:35 scw-6657dc sshd[16449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.253.29.91 Jun 22 06:21:37 scw-6657dc sshd[16449]: Failed password for invalid user wangli from 207.253.29.91 port 38151 ssh2 ... |
2020-06-22 16:13:51 |
104.236.100.42 | attackbotsspam | Attempt to hack Wordpress Login, XMLRPC or other login |
2020-06-22 15:57:31 |
165.227.39.176 | attackspam | www.goldgier.de 165.227.39.176 [22/Jun/2020:05:51:02 +0200] "POST /wp-login.php HTTP/1.1" 200 8766 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" www.goldgier.de 165.227.39.176 [22/Jun/2020:05:51:04 +0200] "POST /wp-login.php HTTP/1.1" 200 8766 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-22 16:22:47 |
106.13.6.116 | attackbotsspam | Jun 22 09:13:50 srv sshd[13242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116 |
2020-06-22 15:47:49 |
124.239.148.63 | attackbots | Port probing on unauthorized port 19311 |
2020-06-22 16:02:40 |
107.170.249.6 | attack | "Unauthorized connection attempt on SSHD detected" |
2020-06-22 16:23:52 |
51.77.226.68 | attackbotsspam | 2020-06-22T04:21:08.027475shield sshd\[554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.226.68 user=root 2020-06-22T04:21:09.842863shield sshd\[554\]: Failed password for root from 51.77.226.68 port 55802 ssh2 2020-06-22T04:24:22.671173shield sshd\[838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.226.68 user=root 2020-06-22T04:24:24.451520shield sshd\[838\]: Failed password for root from 51.77.226.68 port 56446 ssh2 2020-06-22T04:27:44.581073shield sshd\[1152\]: Invalid user guest from 51.77.226.68 port 57092 |
2020-06-22 15:58:41 |
112.123.109.120 | attack | 112.123.109.120 - - \[22/Jun/2020:05:51:05 +0200\] "POST /HNAP1/ HTTP/1.0" 301 551 "-" "-" |
2020-06-22 16:15:15 |
51.79.70.223 | attackspam | Jun 22 08:34:34 inter-technics sshd[6658]: Invalid user pha from 51.79.70.223 port 52424 Jun 22 08:34:34 inter-technics sshd[6658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.70.223 Jun 22 08:34:34 inter-technics sshd[6658]: Invalid user pha from 51.79.70.223 port 52424 Jun 22 08:34:37 inter-technics sshd[6658]: Failed password for invalid user pha from 51.79.70.223 port 52424 ssh2 Jun 22 08:35:45 inter-technics sshd[6735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.70.223 user=mysql Jun 22 08:35:47 inter-technics sshd[6735]: Failed password for mysql from 51.79.70.223 port 42902 ssh2 ... |
2020-06-22 16:03:38 |
14.228.232.118 | attack | 1592797910 - 06/22/2020 05:51:50 Host: 14.228.232.118/14.228.232.118 Port: 445 TCP Blocked |
2020-06-22 15:49:07 |
49.233.177.173 | attackbots | Jun 22 08:07:22 home sshd[19920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.177.173 Jun 22 08:07:24 home sshd[19920]: Failed password for invalid user ki from 49.233.177.173 port 48056 ssh2 Jun 22 08:14:15 home sshd[20661]: Failed password for root from 49.233.177.173 port 41654 ssh2 ... |
2020-06-22 15:56:25 |
107.155.12.140 | attackbots | leo_www |
2020-06-22 16:16:56 |