City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 142.93.161.89 | attack | 142.93.161.89 - - [16/Aug/2020:13:23:32 +0100] "POST /wp-login.php HTTP/1.1" 200 2261 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.161.89 - - [16/Aug/2020:13:23:37 +0100] "POST /wp-login.php HTTP/1.1" 200 2234 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.161.89 - - [16/Aug/2020:13:23:42 +0100] "POST /wp-login.php HTTP/1.1" 200 2190 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-16 23:37:41 |
| 142.93.161.89 | attackbotsspam | 142.93.161.89 - - [09/Aug/2020:22:08:17 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.161.89 - - [09/Aug/2020:22:23:39 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-10 07:01:18 |
| 142.93.161.89 | attack | 142.93.161.89 - - [09/Aug/2020:05:55:05 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.161.89 - - [09/Aug/2020:05:55:07 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.161.89 - - [09/Aug/2020:05:55:08 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-09 13:00:28 |
| 142.93.161.89 | attackbots | Automatic report - XMLRPC Attack |
2020-07-30 06:20:23 |
| 142.93.161.85 | attack | Jul 8 14:17:51 debian-2gb-nbg1-2 kernel: \[16469269.799938\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=142.93.161.85 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=37106 PROTO=TCP SPT=45577 DPT=32295 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-08 20:40:21 |
| 142.93.161.85 | attack | Fail2Ban Ban Triggered |
2020-07-05 07:35:59 |
| 142.93.161.89 | attack | 142.93.161.89 - - - [30/Jun/2020:17:25:39 +0200] "GET /wp-login.php HTTP/1.1" 404 162 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" "-" |
2020-07-01 20:17:41 |
| 142.93.161.89 | attack | 142.93.161.89 - - [09/Jun/2020:14:05:00 +0200] "POST /xmlrpc.php HTTP/1.1" 403 15310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.161.89 - - [09/Jun/2020:14:05:22 +0200] "POST /xmlrpc.php HTTP/1.1" 403 15311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-06-10 00:07:38 |
| 142.93.161.20 | attackspambots | Hits on port : 7899 |
2020-02-11 21:59:45 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.161.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65308
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.161.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:17:40 CST 2025
;; MSG SIZE rcvd: 107
Host 142.161.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.161.93.142.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 64.77.247.132 | attackspam | Unauthorized connection attempt detected from IP address 64.77.247.132 to port 80 |
2020-03-17 22:12:43 |
| 184.105.247.194 | attackbotsspam | Unauthorized connection attempt detected from IP address 184.105.247.194 to port 7547 |
2020-03-17 22:33:15 |
| 108.178.204.3 | attackspambots | Unauthorized connection attempt detected from IP address 108.178.204.3 to port 4567 |
2020-03-17 22:00:45 |
| 185.120.248.26 | attack | Unauthorized connection attempt detected from IP address 185.120.248.26 to port 23 |
2020-03-17 22:32:44 |
| 190.82.118.147 | attack | Unauthorized connection attempt detected from IP address 190.82.118.147 to port 9530 |
2020-03-17 22:28:08 |
| 66.42.111.220 | attack | Unauthorized connection attempt detected from IP address 66.42.111.220 to port 445 |
2020-03-17 22:12:12 |
| 59.26.237.138 | attackbots | Unauthorized connection attempt detected from IP address 59.26.237.138 to port 23 |
2020-03-17 22:13:03 |
| 5.101.0.209 | attack | Unauthorized connection attempt detected from IP address 5.101.0.209 to port 8081 |
2020-03-17 22:19:22 |
| 172.105.23.36 | attackbots | Web application attack detected by fail2ban |
2020-03-17 21:53:18 |
| 197.40.8.153 | attackspambots | Unauthorized connection attempt detected from IP address 197.40.8.153 to port 23 |
2020-03-17 22:25:45 |
| 180.70.176.75 | attack | Unauthorized connection attempt detected from IP address 180.70.176.75 to port 5555 |
2020-03-17 22:34:49 |
| 184.105.139.67 | attack | Unauthorized connection attempt detected from IP address 184.105.139.67 to port 7547 |
2020-03-17 21:47:39 |
| 45.9.148.124 | attackspambots | Unauthorized connection attempt detected from IP address 45.9.148.124 to port 5990 |
2020-03-17 22:15:40 |
| 93.148.176.217 | attackbots | Unauthorized connection attempt detected from IP address 93.148.176.217 to port 23 |
2020-03-17 22:04:36 |
| 220.80.218.112 | attack | Unauthorized connection attempt detected from IP address 220.80.218.112 to port 81 |
2020-03-17 22:20:30 |