City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.42.122.239 | attack | srvr1: (mod_security) mod_security (id:942100) triggered by 119.42.122.239 (TH/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:03:52 [error] 482759#0: *840352 [client 119.42.122.239] ModSecurity: Access denied with code 406 (phase 2). [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801143266.523321"] [ref ""], client: 119.42.122.239, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%27+AND+++9747+%3D+0 HTTP/1.1" [redacted] |
2020-08-22 00:21:11 |
| 119.42.122.85 | attackspambots | Unauthorized IMAP connection attempt |
2020-06-10 19:09:26 |
| 119.42.122.151 | attack | Unauthorized connection attempt detected from IP address 119.42.122.151 to port 445 |
2019-12-23 15:08:49 |
| 119.42.122.196 | attackbots | 119.42.122.196 has been banned from MailServer for Abuse ... |
2019-10-12 20:16:45 |
| 119.42.122.244 | attackbots | 445/tcp [2019-06-27]1pkt |
2019-06-27 21:22:50 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.122.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;119.42.122.2. IN A
;; AUTHORITY SECTION:
. 293 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:36:07 CST 2022
;; MSG SIZE rcvd: 105
Host 2.122.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 2.122.42.119.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.61.37.14 | attackbotsspam | Aug 9 00:43:35 plex sshd[446]: Invalid user lyc from 103.61.37.14 port 53912 |
2019-08-09 11:51:05 |
| 218.166.26.61 | attackspambots | Automatic report - Port Scan Attack |
2019-08-09 12:14:36 |
| 177.129.205.222 | attack | Aug 8 17:46:38 web1 postfix/smtpd[13314]: warning: unknown[177.129.205.222]: SASL PLAIN authentication failed: authentication failure ... |
2019-08-09 11:41:12 |
| 125.209.239.214 | attackspambots | IP-address used to send spoofed e-mails from to targeted business users - asking for bank account number change. |
2019-08-09 12:01:16 |
| 37.187.72.67 | attack | SS5,WP GET /wp-includes/SimplePie/HTTP/newsslide.php?name=htp://example.com&file=test.txt |
2019-08-09 11:59:15 |
| 193.112.72.126 | attack | Aug 9 02:20:13 mail sshd\[14728\]: Failed password for invalid user test7 from 193.112.72.126 port 49280 ssh2 Aug 9 02:36:56 mail sshd\[14866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.72.126 user=root ... |
2019-08-09 11:32:14 |
| 191.53.237.232 | attack | Aug 8 17:46:51 web1 postfix/smtpd[13314]: warning: unknown[191.53.237.232]: SASL PLAIN authentication failed: authentication failure ... |
2019-08-09 11:34:34 |
| 66.70.130.149 | attackspambots | Aug 9 02:44:55 SilenceServices sshd[24091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.149 Aug 9 02:44:58 SilenceServices sshd[24091]: Failed password for invalid user art from 66.70.130.149 port 41920 ssh2 Aug 9 02:49:55 SilenceServices sshd[30007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.149 |
2019-08-09 11:46:26 |
| 37.1.216.222 | attack | SSHScan |
2019-08-09 11:53:48 |
| 58.85.156.48 | attack | Honeypot attack, port: 23, PTR: zaq3a559c30.zaq.ne.jp. |
2019-08-09 12:00:52 |
| 202.163.126.134 | attack | Aug 9 03:35:45 server sshd\[1378\]: Invalid user osmc from 202.163.126.134 port 59455 Aug 9 03:35:45 server sshd\[1378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.126.134 Aug 9 03:35:46 server sshd\[1378\]: Failed password for invalid user osmc from 202.163.126.134 port 59455 ssh2 Aug 9 03:40:59 server sshd\[9477\]: Invalid user ali from 202.163.126.134 port 55917 Aug 9 03:40:59 server sshd\[9477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.126.134 |
2019-08-09 11:57:43 |
| 104.248.221.194 | attackspambots | Aug 9 03:20:21 [munged] sshd[26870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.221.194 |
2019-08-09 12:01:57 |
| 79.188.68.90 | attackspambots | 2019-07-30T05:48:57.976749wiz-ks3 sshd[29925]: Invalid user max from 79.188.68.90 port 58280 2019-07-30T05:48:57.978845wiz-ks3 sshd[29925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=hmq90.internetdsl.tpnet.pl 2019-07-30T05:48:57.976749wiz-ks3 sshd[29925]: Invalid user max from 79.188.68.90 port 58280 2019-07-30T05:48:59.448801wiz-ks3 sshd[29925]: Failed password for invalid user max from 79.188.68.90 port 58280 ssh2 2019-07-30T05:59:15.160325wiz-ks3 sshd[29947]: Invalid user oracleuser from 79.188.68.90 port 60560 2019-07-30T05:59:15.162348wiz-ks3 sshd[29947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=hmq90.internetdsl.tpnet.pl 2019-07-30T05:59:15.160325wiz-ks3 sshd[29947]: Invalid user oracleuser from 79.188.68.90 port 60560 2019-07-30T05:59:17.474812wiz-ks3 sshd[29947]: Failed password for invalid user oracleuser from 79.188.68.90 port 60560 ssh2 2019-07-30T06:06:04.703787wiz-ks3 sshd[29979]: Invalid user tip from 79 |
2019-08-09 12:10:23 |
| 178.157.213.137 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-08-09 12:04:34 |
| 93.105.209.94 | attackbotsspam | Honeypot attack, port: 5555, PTR: 093105209094.rybnik.vectranet.pl. |
2019-08-09 11:55:45 |