City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
142.93.163.152 | attackbots | Port scan: Attack repeated for 24 hours |
2020-08-19 21:16:30 |
142.93.163.152 | attackbotsspam | Unauthorized connection attempt detected from IP address 142.93.163.152 to port 11789 [T] |
2020-08-14 00:05:10 |
142.93.163.152 | attackbotsspam | Port scan denied |
2020-08-09 16:59:53 |
142.93.163.152 | attack | " " |
2020-07-29 16:45:10 |
142.93.163.152 | attackbotsspam | 18093/tcp 9772/tcp 6444/tcp... [2020-05-20/07-21]125pkt,46pt.(tcp) |
2020-07-21 23:41:11 |
142.93.163.152 | attack | Jul 21 05:55:30 debian-2gb-nbg1-2 kernel: \[17562267.187655\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=142.93.163.152 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=19345 PROTO=TCP SPT=40145 DPT=18093 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-21 14:56:44 |
142.93.163.152 | attackbotsspam | Unauthorized connection attempt detected from IP address 142.93.163.152 to port 5375 |
2020-05-09 03:26:24 |
142.93.163.152 | attackbotsspam | scans 2 times in preceeding hours on the ports (in chronological order) 16880 16880 |
2020-04-25 21:05:17 |
142.93.163.77 | attackbots | Brute force attempt |
2020-03-19 09:07:46 |
142.93.163.77 | attack | Invalid user webmaster from 142.93.163.77 port 33344 |
2020-03-14 02:43:57 |
142.93.163.77 | attackspambots | Mar 4 02:38:38 tdfoods sshd\[22571\]: Invalid user user2 from 142.93.163.77 Mar 4 02:38:38 tdfoods sshd\[22571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77 Mar 4 02:38:40 tdfoods sshd\[22571\]: Failed password for invalid user user2 from 142.93.163.77 port 60060 ssh2 Mar 4 02:47:11 tdfoods sshd\[23260\]: Invalid user jira from 142.93.163.77 Mar 4 02:47:11 tdfoods sshd\[23260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77 |
2020-03-04 20:52:30 |
142.93.163.77 | attackspambots | Feb 27 21:40:48 tdfoods sshd\[8663\]: Invalid user a from 142.93.163.77 Feb 27 21:40:48 tdfoods sshd\[8663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77 Feb 27 21:40:50 tdfoods sshd\[8663\]: Failed password for invalid user a from 142.93.163.77 port 59518 ssh2 Feb 27 21:49:39 tdfoods sshd\[9564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77 user=root Feb 27 21:49:41 tdfoods sshd\[9564\]: Failed password for root from 142.93.163.77 port 45148 ssh2 |
2020-02-28 16:03:03 |
142.93.163.77 | attack | Feb 22 19:10:20 hpm sshd\[26175\]: Invalid user amandabackup from 142.93.163.77 Feb 22 19:10:20 hpm sshd\[26175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77 Feb 22 19:10:22 hpm sshd\[26175\]: Failed password for invalid user amandabackup from 142.93.163.77 port 50884 ssh2 Feb 22 19:13:27 hpm sshd\[26436\]: Invalid user openproject from 142.93.163.77 Feb 22 19:13:27 hpm sshd\[26436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.163.77 |
2020-02-23 13:19:54 |
142.93.163.77 | attackspam | Feb 18 16:23:37 IngegnereFirenze sshd[651]: Failed password for invalid user mri from 142.93.163.77 port 51782 ssh2 ... |
2020-02-19 03:23:14 |
142.93.163.77 | attackspambots | web-1 [ssh] SSH Attack |
2020-02-18 03:09:00 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.163.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.163.147. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:43:31 CST 2022
;; MSG SIZE rcvd: 107
Host 147.163.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 147.163.93.142.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
212.92.114.218 | attack | Bruteforcing port 3389 (Remote Desktop) - Exceed maximum 10 attempts/hour |
2019-10-05 03:54:40 |
101.78.209.67 | attack | RDPBruteVem24 |
2019-10-05 03:40:04 |
98.174.90.61 | attack | 04.10.2019 14:20:10 - Login Fail on hMailserver Detected by ELinOX-hMail-A2F |
2019-10-05 04:03:08 |
14.139.231.132 | attack | $f2bV_matches |
2019-10-05 03:29:44 |
222.186.175.216 | attackspambots | Automated report - ssh fail2ban: Oct 4 22:01:36 wrong password, user=root, port=45458, ssh2 Oct 4 22:01:42 wrong password, user=root, port=45458, ssh2 Oct 4 22:01:47 wrong password, user=root, port=45458, ssh2 Oct 4 22:01:53 wrong password, user=root, port=45458, ssh2 |
2019-10-05 04:01:57 |
41.138.55.94 | attack | 2019-10-04T15:45:41.401241shield sshd\[24885\]: Invalid user Scorpion@123 from 41.138.55.94 port 54554 2019-10-04T15:45:41.405840shield sshd\[24885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.55.94 2019-10-04T15:45:42.778931shield sshd\[24885\]: Failed password for invalid user Scorpion@123 from 41.138.55.94 port 54554 ssh2 2019-10-04T15:51:17.171334shield sshd\[26253\]: Invalid user Lucas1@3 from 41.138.55.94 port 41153 2019-10-04T15:51:17.176011shield sshd\[26253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.55.94 |
2019-10-05 03:55:52 |
60.245.42.89 | attack | 445/tcp 445/tcp 445/tcp... [2019-08-05/10-04]5pkt,1pt.(tcp) |
2019-10-05 03:38:57 |
218.75.148.181 | attackbotsspam | Oct 4 **REMOVED** dovecot: imap-login: Disconnected \(auth failed, 1 attempts in 5 secs\): user=\<**REMOVED**.dekrvbr@**REMOVED**.de\>, method=PLAIN, rip=218.75.148.181, lip=**REMOVED**, TLS, session=\ |
2019-10-05 03:42:23 |
212.30.52.243 | attack | Oct 4 19:27:34 work-partkepr sshd\[16097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.30.52.243 user=root Oct 4 19:27:36 work-partkepr sshd\[16097\]: Failed password for root from 212.30.52.243 port 40611 ssh2 ... |
2019-10-05 03:31:03 |
183.110.242.132 | attackspambots | Oct 4 08:48:49 localhost kernel: [3931148.026030] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=183.110.242.132 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=80 ID=13656 DF PROTO=TCP SPT=56351 DPT=25 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 4 08:48:49 localhost kernel: [3931148.026062] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=183.110.242.132 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=80 ID=13656 DF PROTO=TCP SPT=56351 DPT=25 SEQ=3956199275 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 4 11:11:32 localhost kernel: [3939711.826432] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=183.110.242.132 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=76 ID=2244 DF PROTO=TCP SPT=60886 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 Oct 4 11:11:32 localhost kernel: [3939711.826462] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=183.110.242.132 DST=[mungedIP2] LEN=40 TOS |
2019-10-05 03:48:17 |
27.72.73.85 | attackbots | Unauthorised access (Oct 4) SRC=27.72.73.85 LEN=52 TTL=107 ID=26034 DF TCP DPT=445 WINDOW=8192 SYN |
2019-10-05 03:58:39 |
37.59.203.141 | attack | 445/tcp 445/tcp 445/tcp... [2019-08-11/10-04]10pkt,1pt.(tcp) |
2019-10-05 03:59:13 |
51.15.207.74 | attackspam | Oct 4 19:50:20 microserver sshd[4229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74 user=root Oct 4 19:50:22 microserver sshd[4229]: Failed password for root from 51.15.207.74 port 43896 ssh2 Oct 4 19:54:33 microserver sshd[4452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74 user=root Oct 4 19:54:35 microserver sshd[4452]: Failed password for root from 51.15.207.74 port 56236 ssh2 Oct 4 19:58:43 microserver sshd[5074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74 user=root Oct 4 20:11:09 microserver sshd[7023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74 user=root Oct 4 20:11:11 microserver sshd[7023]: Failed password for root from 51.15.207.74 port 49136 ssh2 Oct 4 20:15:23 microserver sshd[7618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse |
2019-10-05 03:37:33 |
156.212.211.242 | attack | Chat Spam |
2019-10-05 04:00:15 |
177.36.43.59 | attackspam | Postfix SMTP rejection ... |
2019-10-05 04:01:07 |