City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
142.44.138.213 | attackbotsspam | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-30T09:21:18Z |
2020-09-30 18:19:15 |
142.44.138.126 | attack | Either the hostname did not match a backend or the resource type is not in use 142.44.138.126, 127.0.0.1 - - [18/Apr/2020:07:23:37 +1200] "GET http://[REDACTED]/ HTTP/1.1" 200 2970 "http://www.rime.red" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; +http://www.komodia.com/newwiki/index.php/URL_server_crawler) KomodiaBot/1.0" 142.44.138.126, 127.0.0.1 - - [18/Apr/2020:07:23:39 +1200] "GET http://[REDACTED]/artwork.html" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; +http://www.komodia.com/newwiki/index.php/URL_server_crawler) KomodiaBot/1.0" 142.44.138.126, 127.0.0.1 - - [18/Apr/2020:07:23:40 +1200] "GET http://[REDACTED]/index.html" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; +http://www.komodia.com/newwiki/index.php/URL_server_crawler) KomodiaBot/1.0" ... |
2020-04-18 03:50:14 |
142.44.138.126 | attackspam | Automated report (2020-01-31T11:22:28+00:00). Misbehaving bot detected at this address. |
2020-01-31 20:20:20 |
142.44.138.126 | attackspam | Automated report (2020-01-27T17:12:17+00:00). Misbehaving bot detected at this address. |
2020-01-28 02:38:26 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.44.138.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.44.138.91. IN A
;; AUTHORITY SECTION:
. 200 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:40:33 CST 2022
;; MSG SIZE rcvd: 106
91.138.44.142.in-addr.arpa domain name pointer ns551149.ip-142-44-138.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
91.138.44.142.in-addr.arpa name = ns551149.ip-142-44-138.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
79.143.120.203 | attackbots | Unauthorized connection attempt detected from IP address 79.143.120.203 to port 80 |
2020-01-05 21:44:17 |
122.4.241.6 | attackbotsspam | Unauthorized connection attempt detected from IP address 122.4.241.6 to port 2220 [J] |
2020-01-05 21:19:05 |
139.198.4.44 | attackspambots | Jan 5 13:33:06 gitlab-ci sshd\[19973\]: Invalid user developer from 139.198.4.44Jan 5 13:36:29 gitlab-ci sshd\[20020\]: Invalid user developer from 139.198.4.44 ... |
2020-01-05 21:40:23 |
103.134.108.254 | attack | 20/1/4@23:51:55: FAIL: Alarm-Network address from=103.134.108.254 ... |
2020-01-05 21:19:27 |
177.94.242.253 | attack | Unauthorized connection attempt detected from IP address 177.94.242.253 to port 23 |
2020-01-05 21:38:07 |
191.32.91.218 | attack | Unauthorized connection attempt detected from IP address 191.32.91.218 to port 81 [J] |
2020-01-05 21:35:28 |
189.156.61.123 | attack | Unauthorized connection attempt detected from IP address 189.156.61.123 to port 445 |
2020-01-05 21:36:29 |
197.45.215.95 | attackbotsspam | Unauthorized connection attempt detected from IP address 197.45.215.95 to port 22 |
2020-01-05 21:33:46 |
61.14.208.253 | attackspam | Mar 12 00:24:57 vpn sshd[9538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.14.208.253 user=backup Mar 12 00:24:59 vpn sshd[9538]: Failed password for backup from 61.14.208.253 port 47348 ssh2 Mar 12 00:25:01 vpn sshd[9540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.14.208.253 user=backup Mar 12 00:25:03 vpn sshd[9542]: Invalid user oracle from 61.14.208.253 Mar 12 00:25:03 vpn sshd[9542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.14.208.253 |
2020-01-05 21:18:46 |
220.125.116.181 | attackspambots | Unauthorized connection attempt detected from IP address 220.125.116.181 to port 85 |
2020-01-05 21:49:07 |
61.125.101.187 | attackbotsspam | Apr 12 14:02:17 vpn sshd[22041]: error: maximum authentication attempts exceeded for invalid user service from 61.125.101.187 port 58668 ssh2 [preauth] |
2020-01-05 21:24:20 |
91.92.210.168 | attackspambots | From CCTV User Interface Log ...::ffff:91.92.210.168 - - [04/Jan/2020:23:51:55 +0000] "GET / HTTP/1.1" 200 960 ... |
2020-01-05 21:17:31 |
46.32.60.139 | attackbots | Jan 5 12:55:29 thevastnessof sshd[8537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.32.60.139 ... |
2020-01-05 21:11:04 |
50.116.3.158 | attack | Unauthorized connection attempt detected from IP address 50.116.3.158 to port 443 |
2020-01-05 21:46:51 |
61.129.42.243 | attackbots | Feb 23 12:47:11 vpn sshd[25930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.129.42.243 Feb 23 12:47:14 vpn sshd[25930]: Failed password for invalid user noc from 61.129.42.243 port 56324 ssh2 Feb 23 12:52:24 vpn sshd[25947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.129.42.243 |
2020-01-05 21:23:55 |