City: unknown
Region: unknown
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
14.142.57.66 | attack | SSH login attempts. |
2020-09-08 20:54:35 |
14.142.57.66 | attackspambots | SSH login attempts. |
2020-09-08 12:47:35 |
14.142.57.66 | attackspambots | $f2bV_matches |
2020-09-08 05:23:06 |
14.142.57.66 | attackbots | Aug 27 23:56:18 abendstille sshd\[17699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 user=root Aug 27 23:56:19 abendstille sshd\[17699\]: Failed password for root from 14.142.57.66 port 59008 ssh2 Aug 28 00:00:41 abendstille sshd\[22038\]: Invalid user developer from 14.142.57.66 Aug 28 00:00:41 abendstille sshd\[22038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 Aug 28 00:00:43 abendstille sshd\[22038\]: Failed password for invalid user developer from 14.142.57.66 port 39672 ssh2 ... |
2020-08-28 06:02:55 |
14.142.57.66 | attackspam | 2020-08-20T22:55:18.229526morrigan.ad5gb.com sshd[1386802]: Invalid user user02 from 14.142.57.66 port 45354 2020-08-20T22:55:20.176804morrigan.ad5gb.com sshd[1386802]: Failed password for invalid user user02 from 14.142.57.66 port 45354 ssh2 |
2020-08-21 15:50:04 |
14.142.57.66 | attack | 2020-08-13T05:52:18.265580n23.at sshd[4072872]: Failed password for root from 14.142.57.66 port 50724 ssh2 2020-08-13T05:56:47.165184n23.at sshd[4076383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 user=root 2020-08-13T05:56:49.268354n23.at sshd[4076383]: Failed password for root from 14.142.57.66 port 33188 ssh2 ... |
2020-08-13 12:34:21 |
14.142.57.66 | attack | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-10 17:12:46 |
14.142.57.66 | attackspam | Failed password for root from 14.142.57.66 port 49852 ssh2 |
2020-08-02 20:32:04 |
14.142.57.66 | attack | Jul 14 06:34:24 vps sshd[22889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 Jul 14 06:34:26 vps sshd[22889]: Failed password for invalid user easy from 14.142.57.66 port 60134 ssh2 Jul 14 06:45:11 vps sshd[23698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 ... |
2020-07-14 16:26:52 |
14.142.57.66 | attackbotsspam | Jul 7 21:28:05 rush sshd[30973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 Jul 7 21:28:08 rush sshd[30973]: Failed password for invalid user user from 14.142.57.66 port 58784 ssh2 Jul 7 21:31:29 rush sshd[31145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 ... |
2020-07-08 09:40:16 |
14.142.57.66 | attackbotsspam | Unauthorized connection attempt detected from IP address 14.142.57.66 to port 22 |
2020-01-10 06:51:23 |
14.142.57.66 | attack | Nov 24 16:51:16 jane sshd[1307]: Failed password for root from 14.142.57.66 port 40598 ssh2 Nov 24 16:58:55 jane sshd[8460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 ... |
2019-11-25 02:41:41 |
14.142.57.66 | attackbots | 2019-11-21T06:00:58.021052abusebot-5.cloudsearch.cf sshd\[17544\]: Invalid user skinny from 14.142.57.66 port 47182 |
2019-11-21 14:29:31 |
14.142.57.66 | attackspambots | Failed password for invalid user peres from 14.142.57.66 port 48460 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 user=root Failed password for root from 14.142.57.66 port 59050 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 user=root Failed password for root from 14.142.57.66 port 41392 ssh2 |
2019-11-05 06:40:09 |
14.142.57.66 | attack | Oct 30 13:54:42 sso sshd[13210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66 Oct 30 13:54:45 sso sshd[13210]: Failed password for invalid user ceshikongjian from 14.142.57.66 port 43480 ssh2 ... |
2019-10-30 22:22:06 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.142.57.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30808
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.142.57.18. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019050100 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 16:37:50 +08 2019
;; MSG SIZE rcvd: 116
18.57.142.14.in-addr.arpa domain name pointer 14.142.57.18.static-Delhi.vsnl.net.in.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
18.57.142.14.in-addr.arpa name = 14.142.57.18.static-Delhi.vsnl.net.in.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
123.133.161.148 | attackbots | Port Scan: TCP/80 |
2019-08-05 12:23:12 |
38.98.229.132 | attackspambots | Port Scan: UDP/49153 |
2019-08-05 11:43:36 |
96.47.138.162 | attack | Port Scan: UDP/137 |
2019-08-05 11:25:30 |
120.86.109.32 | attackspambots | Port Scan: TCP/22 |
2019-08-05 11:20:46 |
132.148.86.231 | attack | Port Scan: TCP/445 |
2019-08-05 12:22:43 |
166.167.216.143 | attackbotsspam | Port Scan: UDP/30 |
2019-08-05 11:55:06 |
173.199.118.131 | attack | Port Scan: TCP/445 |
2019-08-05 11:53:40 |
165.22.237.205 | attackbotsspam | Port Scan: TCP/8088 |
2019-08-05 11:55:43 |
177.69.66.13 | attack | Port Scan: UDP/137 |
2019-08-05 11:52:48 |
220.130.233.29 | attack | Port Scan: TCP/445 |
2019-08-05 11:46:27 |
207.219.72.213 | attack | Port Scan: TCP/445 |
2019-08-05 12:20:33 |
46.173.208.2 | attackspam | Port Scan: TCP/445 |
2019-08-05 11:39:57 |
102.165.202.32 | attack | Port Scan: TCP/993 |
2019-08-05 11:24:55 |
64.191.89.82 | attackspam | Port Scan: UDP/137 |
2019-08-05 12:31:35 |
38.104.159.138 | attackbots | Port Scan: UDP/137 |
2019-08-05 11:42:59 |