City: unknown
Region: unknown
Country: Thailand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 14.207.57.111 | attackspam | SSH/22 MH Probe, BF, Hack - |
2020-07-11 01:44:46 |
| 14.207.57.91 | attack | 1590983128 - 06/01/2020 05:45:28 Host: 14.207.57.91/14.207.57.91 Port: 445 TCP Blocked |
2020-06-01 20:00:33 |
| 14.207.57.126 | attackspambots | 1583241604 - 03/03/2020 14:20:04 Host: 14.207.57.126/14.207.57.126 Port: 445 TCP Blocked |
2020-03-04 05:34:38 |
| 14.207.57.187 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 06-02-2020 04:55:20. |
2020-02-06 15:40:43 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.57.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58984
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.207.57.52. IN A
;; AUTHORITY SECTION:
. 508 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:39:15 CST 2022
;; MSG SIZE rcvd: 105
52.57.207.14.in-addr.arpa domain name pointer mx-ll-14.207.57-52.dynamic.3bb.co.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
52.57.207.14.in-addr.arpa name = mx-ll-14.207.57-52.dynamic.3bb.co.th.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 91.121.183.15 | attack | Malicious/Probing: /wp-login.php |
2020-06-05 00:49:09 |
| 159.65.77.254 | attackbotsspam | Jun 4 14:50:35 vps687878 sshd\[27542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.77.254 user=root Jun 4 14:50:37 vps687878 sshd\[27542\]: Failed password for root from 159.65.77.254 port 53644 ssh2 Jun 4 14:53:07 vps687878 sshd\[27905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.77.254 user=root Jun 4 14:53:09 vps687878 sshd\[27905\]: Failed password for root from 159.65.77.254 port 38742 ssh2 Jun 4 14:55:38 vps687878 sshd\[28185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.77.254 user=root ... |
2020-06-05 00:40:34 |
| 159.65.144.36 | attackspam | (sshd) Failed SSH login from 159.65.144.36 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 4 13:53:47 amsweb01 sshd[30386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.36 user=root Jun 4 13:53:49 amsweb01 sshd[30386]: Failed password for root from 159.65.144.36 port 53150 ssh2 Jun 4 14:01:38 amsweb01 sshd[32169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.36 user=root Jun 4 14:01:40 amsweb01 sshd[32169]: Failed password for root from 159.65.144.36 port 41950 ssh2 Jun 4 14:05:25 amsweb01 sshd[381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.36 user=root |
2020-06-05 00:19:10 |
| 104.248.181.156 | attackbots | Jun 4 16:54:59 icinga sshd[31766]: Failed password for root from 104.248.181.156 port 41466 ssh2 Jun 4 17:00:50 icinga sshd[42034]: Failed password for root from 104.248.181.156 port 40396 ssh2 ... |
2020-06-05 00:38:36 |
| 217.182.71.54 | attack | Jun 4 18:11:51 home sshd[5762]: Failed password for root from 217.182.71.54 port 59605 ssh2 Jun 4 18:15:28 home sshd[6045]: Failed password for root from 217.182.71.54 port 33664 ssh2 ... |
2020-06-05 00:21:03 |
| 106.13.174.144 | attack | Jun 4 15:55:09 sip sshd[1852]: Failed password for root from 106.13.174.144 port 60954 ssh2 Jun 4 16:02:33 sip sshd[4583]: Failed password for root from 106.13.174.144 port 46008 ssh2 |
2020-06-05 00:09:01 |
| 83.31.198.30 | attackbotsspam | Attack |
2020-06-05 00:31:36 |
| 183.6.115.94 | attackbots | Port probing on unauthorized port 1433 |
2020-06-05 00:34:14 |
| 46.59.85.28 | attack | Automatic report - XMLRPC Attack |
2020-06-05 00:50:12 |
| 221.237.10.143 | attack | Jun 4 02:37:04 php1 sshd\[26393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.237.10.143 user=root Jun 4 02:37:06 php1 sshd\[26393\]: Failed password for root from 221.237.10.143 port 41318 ssh2 Jun 4 02:40:26 php1 sshd\[26789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.237.10.143 user=root Jun 4 02:40:28 php1 sshd\[26789\]: Failed password for root from 221.237.10.143 port 54622 ssh2 Jun 4 02:43:55 php1 sshd\[27022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.237.10.143 user=root |
2020-06-05 00:58:15 |
| 122.51.125.71 | attack | Jun 4 15:09:15 nextcloud sshd\[6238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.125.71 user=root Jun 4 15:09:17 nextcloud sshd\[6238\]: Failed password for root from 122.51.125.71 port 45402 ssh2 Jun 4 15:13:09 nextcloud sshd\[12763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.125.71 user=root |
2020-06-05 00:13:21 |
| 82.65.29.31 | attackspam | prod11 ... |
2020-06-05 00:48:00 |
| 203.142.74.234 | attack | Unauthorised access (Jun 4) SRC=203.142.74.234 LEN=52 TTL=49 ID=7921 DF TCP DPT=445 WINDOW=8192 SYN |
2020-06-05 00:17:37 |
| 189.181.91.123 | attackspam | 1591272301 - 06/04/2020 14:05:01 Host: 189.181.91.123/189.181.91.123 Port: 445 TCP Blocked |
2020-06-05 00:44:21 |
| 66.229.188.56 | attack | tcp 8000 |
2020-06-05 00:24:22 |