City: unknown
Region: unknown
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
14.207.42.89 | attackspambots | 2019-12-29 23:48:56 plain_virtual_exim authenticator failed for mx-ll-14.207.42-89.dynamic.3bb.co.th ([127.0.0.1]) [14.207.42.89]: 535 Incorrect authentication data ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.207.42.89 |
2019-12-30 08:21:41 |
14.207.42.142 | attack | Lines containing failures of 14.207.42.142 2019-11-04 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.207.42.142 |
2019-11-05 06:48:58 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.42.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.42.200. IN A
;; AUTHORITY SECTION:
. 485 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:58:09 CST 2022
;; MSG SIZE rcvd: 106
200.42.207.14.in-addr.arpa domain name pointer mx-ll-14.207.42-200.dynamic.3bb.co.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
200.42.207.14.in-addr.arpa name = mx-ll-14.207.42-200.dynamic.3bb.co.th.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
186.101.32.102 | attackspambots | Jun 26 20:22:43 cp sshd[5951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.101.32.102 Jun 26 20:22:43 cp sshd[5951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.101.32.102 |
2019-06-27 06:43:59 |
185.176.27.246 | attackspambots | 57331/tcp 56399/tcp 56231/tcp... [2019-04-26/06-26]3159pkt,1762pt.(tcp) |
2019-06-27 06:44:29 |
66.191.0.147 | attackspam | 2019-06-27T00:07:43.407263enmeeting.mahidol.ac.th sshd\[833\]: User root from 66-191-0-147.dhcp.knwc.wa.charter.com not allowed because not listed in AllowUsers 2019-06-27T00:07:43.531324enmeeting.mahidol.ac.th sshd\[833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66-191-0-147.dhcp.knwc.wa.charter.com user=root 2019-06-27T00:07:46.343407enmeeting.mahidol.ac.th sshd\[833\]: Failed password for invalid user root from 66.191.0.147 port 34163 ssh2 ... |
2019-06-27 06:25:12 |
51.254.58.226 | attackbots | Rude login attack (88 tries in 1d) |
2019-06-27 06:26:45 |
85.163.230.163 | attackspam | Triggered by Fail2Ban at Vostok web server |
2019-06-27 06:49:21 |
212.192.197.134 | attackspam | ft-1848-fussball.de 212.192.197.134 \[27/Jun/2019:00:59:03 +0200\] "POST /wp-login.php HTTP/1.1" 200 2313 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ft-1848-fussball.de 212.192.197.134 \[27/Jun/2019:00:59:04 +0200\] "POST /wp-login.php HTTP/1.1" 200 2278 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-06-27 07:09:41 |
2001:470:b682:ffff:ffff:ffff:ffff:fffe | attackspam | Jun 26 14:59:27 nanto dovecot: imap-login: Disconnected (auth failed, 1 attempts in 2 secs): user= |
2019-06-27 06:50:42 |
94.198.176.45 | attackbotsspam | FTP brute force ... |
2019-06-27 06:49:06 |
196.52.43.110 | attackspambots | Port scan: Attack repeated for 24 hours |
2019-06-27 06:58:12 |
104.248.121.67 | attack | Jun 26 23:32:29 tuxlinux sshd[29808]: Invalid user weblogic from 104.248.121.67 port 49265 Jun 26 23:32:29 tuxlinux sshd[29808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67 Jun 26 23:32:29 tuxlinux sshd[29808]: Invalid user weblogic from 104.248.121.67 port 49265 Jun 26 23:32:29 tuxlinux sshd[29808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67 Jun 26 23:32:29 tuxlinux sshd[29808]: Invalid user weblogic from 104.248.121.67 port 49265 Jun 26 23:32:29 tuxlinux sshd[29808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67 Jun 26 23:32:30 tuxlinux sshd[29808]: Failed password for invalid user weblogic from 104.248.121.67 port 49265 ssh2 ... |
2019-06-27 06:42:04 |
190.111.239.48 | attackbots | Jun 27 01:01:30 vserver sshd\[10055\]: Invalid user moon from 190.111.239.48Jun 27 01:01:32 vserver sshd\[10055\]: Failed password for invalid user moon from 190.111.239.48 port 59958 ssh2Jun 27 01:03:57 vserver sshd\[10083\]: Invalid user toor from 190.111.239.48Jun 27 01:03:59 vserver sshd\[10083\]: Failed password for invalid user toor from 190.111.239.48 port 53710 ssh2 ... |
2019-06-27 07:07:02 |
118.24.165.163 | attackbotsspam | Jun 27 00:59:10 cp sshd[4651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.165.163 Jun 27 00:59:10 cp sshd[4651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.165.163 |
2019-06-27 07:06:06 |
122.192.22.172 | attack | Unauthorised access (Jun 26) SRC=122.192.22.172 LEN=40 TTL=49 ID=38796 TCP DPT=23 WINDOW=51429 SYN |
2019-06-27 06:31:36 |
212.83.153.170 | attackspambots | VoIP Brute Force - 212.83.153.170 - Auto Report ... |
2019-06-27 06:30:44 |
196.52.43.116 | attackbotsspam | [LAN access from remote] from 196.52.43.116:57984 to 192.168.X.XXX:6690, Wednesday, Jun 26,2019 00:27:49 |
2019-06-27 06:51:11 |