City: unknown
Region: unknown
Country: Taiwan, Province of China
Internet Service Provider: Chunghwa Telecom Co. Ltd.
Hostname: unknown
Organization: unknown
Usage Type: unknown
Type | Details | Datetime |
---|---|---|
attack | Unauthorized connection attempt detected from IP address 114.34.44.19 to port 81 [J] |
2020-01-07 19:56:40 |
IP | Type | Details | Datetime |
---|---|---|---|
114.34.44.137 | attack | Port scan denied |
2020-07-14 03:42:56 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.34.44.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.34.44.19. IN A
;; AUTHORITY SECTION:
. 318 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020010700 1800 900 604800 86400
;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 19:56:37 CST 2020
;; MSG SIZE rcvd: 116
19.44.34.114.in-addr.arpa domain name pointer 114-34-44-19.HINET-IP.hinet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
19.44.34.114.in-addr.arpa name = 114-34-44-19.HINET-IP.hinet.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
110.137.103.201 | attackbots | 1592223924 - 06/15/2020 14:25:24 Host: 110.137.103.201/110.137.103.201 Port: 445 TCP Blocked |
2020-06-16 02:57:51 |
78.157.228.52 | attack | Port probing on unauthorized port 5555 |
2020-06-16 03:00:41 |
193.112.206.214 | attackbots | 404 NOT FOUND |
2020-06-16 03:08:19 |
112.17.79.156 | attack | Scanned 325 unique addresses for 2 unique ports in 24 hours (ports 15021,29871) |
2020-06-16 03:01:47 |
45.249.94.149 | attackspam | Jun 15 21:18:30 eventyay sshd[14072]: Failed password for root from 45.249.94.149 port 54122 ssh2 Jun 15 21:22:03 eventyay sshd[14315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.249.94.149 Jun 15 21:22:05 eventyay sshd[14315]: Failed password for invalid user oracle from 45.249.94.149 port 54393 ssh2 ... |
2020-06-16 03:28:12 |
152.136.203.208 | attackbotsspam | (sshd) Failed SSH login from 152.136.203.208 (CN/China/-): 5 in the last 3600 secs |
2020-06-16 03:15:29 |
199.229.249.160 | attack | 1 attempts against mh-modsecurity-ban on mist |
2020-06-16 03:06:16 |
125.141.139.9 | attackbotsspam | SSH Bruteforce Attempt (failed auth) |
2020-06-16 03:02:23 |
212.64.78.151 | attackspam | Tried sshing with brute force. |
2020-06-16 03:23:04 |
23.129.64.100 | attack | 2020-06-15 07:12:25.980229-0500 localhost sshd[47082]: Failed password for www from 23.129.64.100 port 40393 ssh2 |
2020-06-16 02:58:07 |
137.59.227.216 | attackbotsspam | Unauthorized connection attempt from IP address 137.59.227.216 on Port 445(SMB) |
2020-06-16 02:51:51 |
168.63.151.21 | attack | SSH Brute-Force reported by Fail2Ban |
2020-06-16 03:19:16 |
193.95.247.90 | attackspambots | Jun 15 14:47:40 Tower sshd[19627]: Connection from 193.95.247.90 port 34784 on 192.168.10.220 port 22 rdomain "" Jun 15 14:47:41 Tower sshd[19627]: Failed password for root from 193.95.247.90 port 34784 ssh2 Jun 15 14:47:41 Tower sshd[19627]: Received disconnect from 193.95.247.90 port 34784:11: Bye Bye [preauth] Jun 15 14:47:41 Tower sshd[19627]: Disconnected from authenticating user root 193.95.247.90 port 34784 [preauth] |
2020-06-16 02:57:33 |
130.105.63.214 | attackspam | Unauthorized connection attempt from IP address 130.105.63.214 on Port 445(SMB) |
2020-06-16 02:54:02 |
138.68.21.125 | attackbots | Jun 15 22:50:13 NG-HHDC-SVS-001 sshd[6818]: Invalid user calista from 138.68.21.125 ... |
2020-06-16 03:22:09 |