City: Amsterdam
Region: Noord Holland
Country: The Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
142.93.130.58 | attack | Invalid user licm from 142.93.130.58 port 41768 |
2020-09-16 19:29:17 |
142.93.130.58 | attack | Sep 15 13:58:41 jane sshd[29119]: Failed password for root from 142.93.130.58 port 42294 ssh2 ... |
2020-09-15 20:49:16 |
142.93.130.58 | attackspambots | srv02 Mass scanning activity detected Target: 26326 .. |
2020-09-15 12:48:52 |
142.93.130.58 | attackspam | Sep 14 13:49:56 mockhub sshd[340546]: Failed password for root from 142.93.130.58 port 59176 ssh2 Sep 14 13:53:36 mockhub sshd[340784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.130.58 user=root Sep 14 13:53:38 mockhub sshd[340784]: Failed password for root from 142.93.130.58 port 42642 ssh2 ... |
2020-09-15 04:58:16 |
142.93.130.58 | attack | Sep 7 14:24:32 nuernberg-4g-01 sshd[422]: Failed password for root from 142.93.130.58 port 44126 ssh2 Sep 7 14:27:50 nuernberg-4g-01 sshd[1518]: Failed password for root from 142.93.130.58 port 48178 ssh2 Sep 7 14:31:12 nuernberg-4g-01 sshd[2669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.130.58 |
2020-09-07 21:32:34 |
142.93.130.58 | attack | Port scan: Attack repeated for 24 hours |
2020-09-07 13:17:50 |
142.93.130.58 | attackbots | srv02 Mass scanning activity detected Target: 29750 .. |
2020-09-07 05:53:38 |
142.93.130.58 | attackspambots | Aug 23 06:46:14 home sshd[3547347]: Failed password for root from 142.93.130.58 port 54758 ssh2 Aug 23 06:50:02 home sshd[3548659]: Invalid user epm from 142.93.130.58 port 35312 Aug 23 06:50:02 home sshd[3548659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.130.58 Aug 23 06:50:02 home sshd[3548659]: Invalid user epm from 142.93.130.58 port 35312 Aug 23 06:50:04 home sshd[3548659]: Failed password for invalid user epm from 142.93.130.58 port 35312 ssh2 ... |
2020-08-23 12:53:24 |
142.93.130.58 | attackbotsspam | Fail2Ban Ban Triggered |
2020-08-18 19:34:21 |
142.93.130.169 | attackbotsspam | Unauthorized access detected from black listed ip! |
2020-08-16 05:35:05 |
142.93.130.58 | attackspam | Triggered by Fail2Ban at Ares web server |
2020-08-11 23:20:25 |
142.93.130.58 | attack | Aug 7 06:59:07 mertcangokgoz-v4-main kernel: [389683.851455] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:5a:6b:04:d2:74:7f:6e:37:e3:08:00 SRC=142.93.130.58 DST=94.130.96.165 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=49083 PROTO=TCP SPT=44570 DPT=1166 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-08-07 12:07:03 |
142.93.130.58 | attackbots | firewall-block, port(s): 9578/tcp |
2020-08-06 08:27:50 |
142.93.130.58 | attackspambots |
|
2020-08-06 00:49:05 |
142.93.130.58 | attackbots | Invalid user samuele from 142.93.130.58 port 49480 |
2020-07-27 20:52:14 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.130.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36778
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.130.218. IN A
;; AUTHORITY SECTION:
. 197 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024051102 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 12 09:51:28 CST 2024
;; MSG SIZE rcvd: 107
218.130.93.142.in-addr.arpa domain name pointer ns1.multiserve.nl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
218.130.93.142.in-addr.arpa name = ns1.multiserve.nl.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
142.93.212.168 | attackbotsspam | Oct 3 23:41:05 v22019058497090703 sshd[26453]: Failed password for root from 142.93.212.168 port 57132 ssh2 Oct 3 23:45:21 v22019058497090703 sshd[26736]: Failed password for root from 142.93.212.168 port 42146 ssh2 ... |
2019-10-04 05:57:11 |
222.186.173.154 | attackbots | Oct 4 00:08:37 vpn01 sshd[22787]: Failed password for root from 222.186.173.154 port 60370 ssh2 Oct 4 00:08:41 vpn01 sshd[22787]: Failed password for root from 222.186.173.154 port 60370 ssh2 ... |
2019-10-04 06:18:18 |
139.59.78.236 | attack | Oct 3 23:10:24 andromeda sshd\[37477\]: Invalid user ldap from 139.59.78.236 port 54730 Oct 3 23:10:24 andromeda sshd\[37477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.78.236 Oct 3 23:10:25 andromeda sshd\[37477\]: Failed password for invalid user ldap from 139.59.78.236 port 54730 ssh2 |
2019-10-04 05:55:37 |
51.91.250.49 | attack | Oct 4 00:27:41 localhost sshd\[11495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.250.49 user=root Oct 4 00:27:43 localhost sshd\[11495\]: Failed password for root from 51.91.250.49 port 34818 ssh2 Oct 4 00:31:09 localhost sshd\[11830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.250.49 user=root |
2019-10-04 06:31:22 |
118.25.42.51 | attackspambots | Oct 3 11:43:15 tdfoods sshd\[32360\]: Invalid user 123E456Y from 118.25.42.51 Oct 3 11:43:15 tdfoods sshd\[32360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.42.51 Oct 3 11:43:17 tdfoods sshd\[32360\]: Failed password for invalid user 123E456Y from 118.25.42.51 port 51960 ssh2 Oct 3 11:47:46 tdfoods sshd\[32718\]: Invalid user Caramba_123 from 118.25.42.51 Oct 3 11:47:46 tdfoods sshd\[32718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.42.51 |
2019-10-04 06:01:38 |
222.186.15.101 | attackspam | Oct 3 12:09:23 tdfoods sshd\[2322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101 user=root Oct 3 12:09:26 tdfoods sshd\[2322\]: Failed password for root from 222.186.15.101 port 51601 ssh2 Oct 3 12:09:27 tdfoods sshd\[2322\]: Failed password for root from 222.186.15.101 port 51601 ssh2 Oct 3 12:09:29 tdfoods sshd\[2322\]: Failed password for root from 222.186.15.101 port 51601 ssh2 Oct 3 12:18:05 tdfoods sshd\[3093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101 user=root |
2019-10-04 06:18:49 |
206.189.166.172 | attack | Invalid user jasper from 206.189.166.172 port 53806 |
2019-10-04 06:20:53 |
162.241.200.117 | attackspam | SSH Brute Force, server-1 sshd[7254]: Failed password for root from 162.241.200.117 port 56044 ssh2 |
2019-10-04 06:26:52 |
125.254.90.166 | attackspam | Sep 30 03:18:36 h2421860 postfix/postscreen[7757]: CONNECT from [125.254.90.166]:59023 to [85.214.119.52]:25 Sep 30 03:18:36 h2421860 postfix/dnsblog[8534]: addr 125.254.90.166 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Sep 30 03:18:36 h2421860 postfix/dnsblog[8539]: addr 125.254.90.166 listed by domain zen.spamhaus.org as 127.0.0.3 Sep 30 03:18:36 h2421860 postfix/dnsblog[8539]: addr 125.254.90.166 listed by domain zen.spamhaus.org as 127.0.0.4 Sep 30 03:18:36 h2421860 postfix/dnsblog[8539]: addr 125.254.90.166 listed by domain Unknown.trblspam.com as 185.53.179.7 Sep 30 03:18:36 h2421860 postfix/dnsblog[8533]: addr 125.254.90.166 listed by domain bl.blocklist.de as 127.0.0.9 Sep 30 03:18:36 h2421860 postfix/dnsblog[8536]: addr 125.254.90.166 listed by domain b.barracudacentral.org as 127.0.0.2 Sep 30 03:18:36 h2421860 postfix/dnsblog[8540]: addr 125.254.90.166 listed by domain dnsbl.sorbs.net as 127.0.0.3 Sep 30 03:18:36 h2421860 postfix/dnsblog[8540]: addr 125........ ------------------------------- |
2019-10-04 06:15:03 |
47.98.138.161 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-04 06:32:10 |
155.4.32.16 | attack | 2019-10-03T21:58:11.429914abusebot-5.cloudsearch.cf sshd\[23033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h-32-16.a182.priv.bahnhof.se user=root |
2019-10-04 06:18:31 |
104.237.135.202 | attackbots | 03.10.2019 22:52:13 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter |
2019-10-04 06:22:21 |
222.186.15.160 | attackspam | SSH Brute-Force attacks |
2019-10-04 06:19:45 |
106.12.80.87 | attack | Lines containing failures of 106.12.80.87 Sep 30 14:00:54 dns01 sshd[22721]: Invalid user usuario from 106.12.80.87 port 41320 Sep 30 14:00:54 dns01 sshd[22721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.80.87 Sep 30 14:00:56 dns01 sshd[22721]: Failed password for invalid user usuario from 106.12.80.87 port 41320 ssh2 Sep 30 14:00:56 dns01 sshd[22721]: Received disconnect from 106.12.80.87 port 41320:11: Bye Bye [preauth] Sep 30 14:00:56 dns01 sshd[22721]: Disconnected from invalid user usuario 106.12.80.87 port 41320 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=106.12.80.87 |
2019-10-04 06:29:51 |
81.130.138.156 | attackspambots | Oct 4 03:39:41 areeb-Workstation sshd[10923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.130.138.156 Oct 4 03:39:43 areeb-Workstation sshd[10923]: Failed password for invalid user FAKEPASS from 81.130.138.156 port 43160 ssh2 ... |
2019-10-04 06:22:33 |