City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 142.93.154.174 | attack | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-10-08 03:14:31 |
| 142.93.154.174 | attackbots | TCP port : 9346 |
2020-10-07 19:28:32 |
| 142.93.154.174 | attackspambots | TCP ports : 3601 / 17328 |
2020-09-04 20:36:16 |
| 142.93.154.174 | attackspambots | SSH Bruteforce attack |
2020-09-04 12:17:00 |
| 142.93.154.174 | attackspambots | Sep 3 19:48:17 nuernberg-4g-01 sshd[8373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 Sep 3 19:48:19 nuernberg-4g-01 sshd[8373]: Failed password for invalid user cam from 142.93.154.174 port 40492 ssh2 Sep 3 19:53:09 nuernberg-4g-01 sshd[9921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 |
2020-09-04 04:47:58 |
| 142.93.154.174 | attack | 2020-08-26T20:43:36.521603vps773228.ovh.net sshd[7078]: Invalid user abi from 142.93.154.174 port 51310 2020-08-26T20:43:36.538081vps773228.ovh.net sshd[7078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 2020-08-26T20:43:36.521603vps773228.ovh.net sshd[7078]: Invalid user abi from 142.93.154.174 port 51310 2020-08-26T20:43:39.109025vps773228.ovh.net sshd[7078]: Failed password for invalid user abi from 142.93.154.174 port 51310 ssh2 2020-08-26T20:48:17.796936vps773228.ovh.net sshd[7126]: Invalid user bsr from 142.93.154.174 port 58628 ... |
2020-08-27 03:04:11 |
| 142.93.154.174 | attackspam | Invalid user aziz from 142.93.154.174 port 55712 |
2020-08-26 01:04:28 |
| 142.93.154.174 | attackspambots | Aug 22 14:16:02 v22019038103785759 sshd\[6626\]: Invalid user cmdb from 142.93.154.174 port 50068 Aug 22 14:16:02 v22019038103785759 sshd\[6626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 Aug 22 14:16:03 v22019038103785759 sshd\[6626\]: Failed password for invalid user cmdb from 142.93.154.174 port 50068 ssh2 Aug 22 14:21:22 v22019038103785759 sshd\[7219\]: Invalid user mdk from 142.93.154.174 port 57842 Aug 22 14:21:22 v22019038103785759 sshd\[7219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 ... |
2020-08-22 20:22:07 |
| 142.93.154.174 | attackbots | Aug 19 23:33:40 localhost sshd[66314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 user=root Aug 19 23:33:41 localhost sshd[66314]: Failed password for root from 142.93.154.174 port 57826 ssh2 Aug 19 23:41:37 localhost sshd[67264]: Invalid user dpn from 142.93.154.174 port 40152 Aug 19 23:41:37 localhost sshd[67264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 Aug 19 23:41:37 localhost sshd[67264]: Invalid user dpn from 142.93.154.174 port 40152 Aug 19 23:41:39 localhost sshd[67264]: Failed password for invalid user dpn from 142.93.154.174 port 40152 ssh2 ... |
2020-08-20 08:11:08 |
| 142.93.154.174 | attack | Aug 18 12:35:17 *** sshd[30905]: Invalid user dyc from 142.93.154.174 |
2020-08-18 21:16:19 |
| 142.93.154.174 | attackbots | Aug 13 11:40:14 vmd17057 sshd[19263]: Failed password for root from 142.93.154.174 port 46428 ssh2 ... |
2020-08-13 20:00:45 |
| 142.93.154.174 | attackbotsspam | Jul 23 06:30:36 [host] sshd[5916]: Invalid user an Jul 23 06:30:36 [host] sshd[5916]: pam_unix(sshd:a Jul 23 06:30:38 [host] sshd[5916]: Failed password |
2020-07-23 12:45:19 |
| 142.93.154.174 | attack | Jul 19 02:15:25 george sshd[11181]: Failed password for invalid user asecruc from 142.93.154.174 port 41406 ssh2 Jul 19 02:20:39 george sshd[11246]: Invalid user user from 142.93.154.174 port 58686 Jul 19 02:20:39 george sshd[11246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 Jul 19 02:20:41 george sshd[11246]: Failed password for invalid user user from 142.93.154.174 port 58686 ssh2 Jul 19 02:25:49 george sshd[12905]: Invalid user demo from 142.93.154.174 port 47732 ... |
2020-07-19 15:02:22 |
| 142.93.154.174 | attack | Jul 15 05:04:35 vpn01 sshd[11061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.154.174 Jul 15 05:04:38 vpn01 sshd[11061]: Failed password for invalid user remi from 142.93.154.174 port 37732 ssh2 ... |
2020-07-15 12:05:54 |
| 142.93.154.174 | attack | Brute force attempt |
2020-07-07 19:06:05 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.154.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.154.44. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:05:24 CST 2022
;; MSG SIZE rcvd: 106
Host 44.154.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 44.154.93.142.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 182.56.58.109 | attack | $f2bV_matches |
2020-07-07 09:24:38 |
| 111.229.252.207 | attackspambots | Brute-force attempt banned |
2020-07-07 12:22:55 |
| 185.153.196.230 | attack | Apr 13 22:38:17 Mojo sshd[20028]: Invalid user 101 from 185.153.196.230 port 59475 Apr 13 22:38:17 Mojo sshd[20028]: input_userauth_request: invalid user 101 [preauth] Apr 13 22:38:18 Mojo sshd[20028]: Disconnecting: Change of username or service not allowed: (101,ssh-connection) -> (123,ssh-connection) [preauth] Apr 13 22:38:29 Mojo sshd[20151]: Invalid user 123 from 185.153.196.230 port 34620 Apr 13 22:38:29 Mojo sshd[20151]: input_userauth_request: invalid user 123 [preauth] Apr 13 22:38:32 Mojo sshd[20151]: Disconnecting: Change of username or service not allowed: (123,ssh-connection) -> (1111,ssh-connection) [preauth] Apr 13 22:38:38 Mojo sshd[20169]: Invalid user 1111 from 185.153.196.230 port 32884 Apr 13 22:38:38 Mojo sshd[20169]: input_userauth_request: invalid user 1111 [preauth] Apr 13 22:38:42 Mojo sshd[20169]: Disconnecting: Change of username or service not allowed: (1111,ssh-connection) -> (1234,ssh-connection) [preauth] Apr 13 22:40:22 Mojo sshd[20398]: Invalid user 1234 from 185.153.196.230 port 39963 Apr 13 22:40:22 Mojo sshd[20398]: input_userauth_request: invalid user 1234 [preauth] Apr 13 22:40:27 Mojo sshd[20398]: error: maximum authentication attempts exceeded for invalid user 1234 from 185.153.196.230 port 39963 ssh2 [preauth] Apr 13 22:40:27 Mojo sshd[20398]: Disconnecting: Too many authentication failures [preauth] |
2020-07-07 12:05:56 |
| 51.75.144.43 | attackspam | SSH Brute Force |
2020-07-07 12:18:15 |
| 46.38.150.72 | attack | 2020-07-06T21:56:57.916290linuxbox-skyline auth[670077]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=ploter rhost=46.38.150.72 ... |
2020-07-07 12:09:45 |
| 152.67.35.185 | attack | pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.35.185 user=root Failed password for root from 152.67.35.185 port 46814 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.35.185 user=root Failed password for root from 152.67.35.185 port 46148 ssh2 Invalid user sam from 152.67.35.185 port 44808 |
2020-07-07 12:14:03 |
| 181.164.132.26 | attackbots | Jul 7 06:51:16 journals sshd\[24134\]: Invalid user fax from 181.164.132.26 Jul 7 06:51:16 journals sshd\[24134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.164.132.26 Jul 7 06:51:18 journals sshd\[24134\]: Failed password for invalid user fax from 181.164.132.26 port 44660 ssh2 Jul 7 06:57:02 journals sshd\[24640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.164.132.26 user=root Jul 7 06:57:05 journals sshd\[24640\]: Failed password for root from 181.164.132.26 port 57000 ssh2 ... |
2020-07-07 12:02:08 |
| 183.89.76.133 | attackbots | 20/7/7@00:18:22: FAIL: Alarm-Network address from=183.89.76.133 20/7/7@00:18:22: FAIL: Alarm-Network address from=183.89.76.133 ... |
2020-07-07 12:22:10 |
| 51.38.57.78 | attackbotsspam | Jul 6 23:13:32 XXX sshd[30102]: Invalid user test0001 from 51.38.57.78 port 36040 |
2020-07-07 09:30:04 |
| 41.72.198.40 | attackspambots | 3389BruteforceStormFW21 |
2020-07-07 12:21:42 |
| 222.186.175.163 | attackspam | 2020-07-07T05:56:34.724685centos sshd[9453]: Failed password for root from 222.186.175.163 port 22782 ssh2 2020-07-07T05:56:39.421608centos sshd[9453]: Failed password for root from 222.186.175.163 port 22782 ssh2 2020-07-07T05:56:42.807026centos sshd[9453]: Failed password for root from 222.186.175.163 port 22782 ssh2 ... |
2020-07-07 12:16:56 |
| 159.65.158.172 | attackspambots | Jul 6 23:49:46 NPSTNNYC01T sshd[6493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.172 Jul 6 23:49:47 NPSTNNYC01T sshd[6493]: Failed password for invalid user tomcat from 159.65.158.172 port 57144 ssh2 Jul 6 23:56:43 NPSTNNYC01T sshd[6948]: Failed password for root from 159.65.158.172 port 59176 ssh2 ... |
2020-07-07 12:22:37 |
| 2001:41d0:1004:2384::1 | attackspambots | 2001:41d0:1004:2384::1 - - [06/Jul/2020:22:00:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2345 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 2001:41d0:1004:2384::1 - - [06/Jul/2020:22:00:02 +0100] "POST /wp-login.php HTTP/1.1" 200 2329 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 2001:41d0:1004:2384::1 - - [06/Jul/2020:22:00:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2329 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-07 09:23:13 |
| 185.63.253.157 | attack | Jul 7 05:55:54 sd-69548 sshd[3914236]: Unable to negotiate with 185.63.253.157 port 36700: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Jul 7 05:56:45 sd-69548 sshd[3914297]: Unable to negotiate with 185.63.253.157 port 38292: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2020-07-07 12:19:00 |
| 200.160.111.44 | attack | 20 attempts against mh-ssh on cloud |
2020-07-07 09:27:49 |