City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 142.93.150.112 | attack | 142.93.150.112 - - [29/Aug/2020:22:46:15 +0100] "POST /wp-login.php HTTP/1.1" 200 2183 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.150.112 - - [29/Aug/2020:22:46:17 +0100] "POST /wp-login.php HTTP/1.1" 200 2159 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.150.112 - - [29/Aug/2020:22:46:19 +0100] "POST /wp-login.php HTTP/1.1" 200 2161 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-30 05:49:21 |
| 142.93.150.175 | attackbots | fail2ban |
2020-06-11 08:32:55 |
| 142.93.150.175 | attackbots | Jun 9 23:07:02 cdc sshd[4074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.150.175 Jun 9 23:07:05 cdc sshd[4074]: Failed password for invalid user junshang from 142.93.150.175 port 48772 ssh2 |
2020-06-10 06:26:45 |
| 142.93.150.175 | attackspambots | Jun 8 19:48:43 |
2020-06-09 04:06:54 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.150.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29157
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.150.70. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400
;; Query time: 250 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 05:11:31 CST 2025
;; MSG SIZE rcvd: 106
Host 70.150.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 70.150.93.142.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.146.1.107 | attackbotsspam | HTTP/80/443 Probe, Hack - |
2019-10-04 03:31:03 |
| 178.62.214.85 | attack | Oct 3 15:17:59 server sshd\[27310\]: Invalid user shop from 178.62.214.85 port 39743 Oct 3 15:17:59 server sshd\[27310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.214.85 Oct 3 15:18:00 server sshd\[27310\]: Failed password for invalid user shop from 178.62.214.85 port 39743 ssh2 Oct 3 15:22:13 server sshd\[10211\]: Invalid user ying from 178.62.214.85 port 59934 Oct 3 15:22:13 server sshd\[10211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.214.85 |
2019-10-04 03:19:13 |
| 60.30.158.26 | attackbots | [munged]::443 60.30.158.26 - - [03/Oct/2019:14:22:26 +0200] "POST /[munged]: HTTP/1.1" 200 9038 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 60.30.158.26 - - [03/Oct/2019:14:22:27 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 60.30.158.26 - - [03/Oct/2019:14:22:28 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 60.30.158.26 - - [03/Oct/2019:14:22:30 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 60.30.158.26 - - [03/Oct/2019:14:22:31 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 60.30.158.26 - - [03/Oct/2019:14:22:32 +0200] |
2019-10-04 03:02:32 |
| 45.55.42.17 | attackspam | 2019-10-03T18:56:01.544547abusebot-2.cloudsearch.cf sshd\[6910\]: Invalid user elsa from 45.55.42.17 port 59404 |
2019-10-04 03:00:09 |
| 101.0.119.58 | attackbots | abcdata-sys.de:80 101.0.119.58 - - \[03/Oct/2019:14:22:36 +0200\] "POST /xmlrpc.php HTTP/1.1" 301 441 "-" "WordPress" www.goldgier.de 101.0.119.58 \[03/Oct/2019:14:22:37 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4484 "-" "WordPress" |
2019-10-04 03:01:39 |
| 185.209.0.58 | attackbotsspam | 10/03/2019-19:54:06.339559 185.209.0.58 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-04 03:08:29 |
| 54.39.18.237 | attackspambots | Oct 1 21:02:59 ns341937 sshd[19829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.18.237 Oct 1 21:03:02 ns341937 sshd[19829]: Failed password for invalid user admin from 54.39.18.237 port 53256 ssh2 Oct 1 21:24:23 ns341937 sshd[25678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.18.237 ... |
2019-10-04 03:04:35 |
| 39.105.20.104 | attackbotsspam | LAV,DEF GET /phpmyadmin/index.php |
2019-10-04 03:23:37 |
| 159.203.201.134 | attackbotsspam | " " |
2019-10-04 03:32:21 |
| 159.203.201.79 | attackspam | 10/03/2019-19:09:53.423622 159.203.201.79 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-04 02:55:47 |
| 85.12.254.245 | attackspambots | Unauthorized access detected from banned ip |
2019-10-04 03:21:11 |
| 51.79.129.237 | attack | $f2bV_matches |
2019-10-04 03:12:52 |
| 132.232.40.45 | attackbotsspam | Oct 3 20:30:25 rotator sshd\[2402\]: Invalid user jira from 132.232.40.45Oct 3 20:30:28 rotator sshd\[2402\]: Failed password for invalid user jira from 132.232.40.45 port 43116 ssh2Oct 3 20:35:21 rotator sshd\[3206\]: Invalid user leroi from 132.232.40.45Oct 3 20:35:23 rotator sshd\[3206\]: Failed password for invalid user leroi from 132.232.40.45 port 54742 ssh2Oct 3 20:40:17 rotator sshd\[3948\]: Invalid user cn from 132.232.40.45Oct 3 20:40:19 rotator sshd\[3948\]: Failed password for invalid user cn from 132.232.40.45 port 38144 ssh2 ... |
2019-10-04 03:20:05 |
| 179.52.135.220 | attack | Automated reporting of SSH Vulnerability scanning |
2019-10-04 03:22:36 |
| 59.6.100.121 | attack | Automated reporting of SSH Vulnerability scanning |
2019-10-04 03:10:49 |