City: North Bergen
Region: New Jersey
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
142.93.240.62 | spamattack | PHISHING AND SPAM ATTACK FROM "Important Notification - newsletter@app.ksinergy.biz - " : SUBJECT "Congrats! Open Immediately! " : RECEIVED "from mail-02.ksinergy.biz ([142.93.240.62]:39126) " : DATE/TIMESENT "Mon, 01 Mar 2021 10:14:52 ": IP ADDRESS "inetnum: 142.93.0.0 - 142.93.255.255 OrgName: DigitalOcean, LLC |
2021-03-01 08:16:37 |
142.93.240.62 | spamattack | PHISHING AND SPAM ATTACK FROM "Casino For You - newsletter@app.ksinergy.biz -" : SUBJECT "Join today and receive an amazing welcome bonus " : RECEIVED "from mail-02.ksinergy.biz ([142.93.240.62]:57421) " : DATE/TIMESENT "Tue, 23 Feb 2021 01:27:07 " |
2021-02-23 04:32:24 |
142.93.212.91 | attackbotsspam | SSH BruteForce Attack |
2020-10-13 01:56:49 |
142.93.237.57 | attack | Multiport scan 2 ports : 1583 27080 |
2020-10-12 21:16:28 |
142.93.212.91 | attack | Oct 12 10:23:09 localhost sshd\[19098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.91 user=root Oct 12 10:23:11 localhost sshd\[19098\]: Failed password for root from 142.93.212.91 port 59394 ssh2 Oct 12 10:27:27 localhost sshd\[19552\]: Invalid user sanjeev from 142.93.212.91 Oct 12 10:27:27 localhost sshd\[19552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.91 Oct 12 10:27:29 localhost sshd\[19552\]: Failed password for invalid user sanjeev from 142.93.212.91 port 36984 ssh2 ... |
2020-10-12 17:20:25 |
142.93.237.57 | attack | 1089/tcp 5984/tcp [2020-10-11]2pkt |
2020-10-12 12:46:46 |
142.93.211.36 | attackspambots | Oct 12 00:25:27 *hidden* sshd[869]: Failed password for *hidden* from 142.93.211.36 port 56534 ssh2 Oct 12 00:28:28 *hidden* sshd[1320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.36 user=root Oct 12 00:28:30 *hidden* sshd[1320]: Failed password for *hidden* from 142.93.211.36 port 40212 ssh2 |
2020-10-12 07:11:11 |
142.93.209.251 | attackbotsspam | Oct 11 22:07:55 v2202009116398126984 sshd[2515868]: Invalid user elke from 142.93.209.251 port 44534 ... |
2020-10-12 06:24:15 |
142.93.223.118 | attackspam | SSH login attempts. |
2020-10-12 04:12:31 |
142.93.211.36 | attackspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-10-11 23:23:00 |
142.93.209.251 | attack | Oct 11 16:26:57 sso sshd[30604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251 Oct 11 16:26:59 sso sshd[30604]: Failed password for invalid user chris from 142.93.209.251 port 59794 ssh2 ... |
2020-10-11 22:34:31 |
142.93.223.118 | attackspam | SSH login attempts. |
2020-10-11 20:11:30 |
142.93.211.36 | attack | Fail2Ban |
2020-10-11 15:21:45 |
142.93.209.251 | attackbots | (sshd) Failed SSH login from 142.93.209.251 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 00:54:24 optimus sshd[28004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251 user=root Oct 11 00:54:27 optimus sshd[28004]: Failed password for root from 142.93.209.251 port 54930 ssh2 Oct 11 01:19:11 optimus sshd[6951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251 user=root Oct 11 01:19:13 optimus sshd[6951]: Failed password for root from 142.93.209.251 port 56072 ssh2 Oct 11 01:24:49 optimus sshd[11852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.209.251 user=root |
2020-10-11 14:29:57 |
142.93.223.118 | attackspam | 2020-10-11T07:03:53.476597lavrinenko.info sshd[19701]: Failed password for root from 142.93.223.118 port 55582 ssh2 2020-10-11T07:07:58.292860lavrinenko.info sshd[19798]: Invalid user next from 142.93.223.118 port 33376 2020-10-11T07:07:58.302917lavrinenko.info sshd[19798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.223.118 2020-10-11T07:07:58.292860lavrinenko.info sshd[19798]: Invalid user next from 142.93.223.118 port 33376 2020-10-11T07:08:00.553715lavrinenko.info sshd[19798]: Failed password for invalid user next from 142.93.223.118 port 33376 ssh2 ... |
2020-10-11 12:10:33 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.2.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.2.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025061000 1800 900 604800 86400
;; Query time: 284 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 11 02:00:08 CST 2025
;; MSG SIZE rcvd: 104
Host 42.2.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.2.93.142.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
97.74.24.136 | attack | REQUESTED PAGE: /xmlrpc.php |
2020-07-08 22:11:33 |
218.249.69.210 | attackspam | 1433/tcp 1433/tcp 1433/tcp [2020-05-27/07-08]3pkt |
2020-07-08 22:35:41 |
87.122.83.204 | attackbots | Lines containing failures of 87.122.83.204 Jul 7 15:55:26 newdogma sshd[29768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.122.83.204 user=backup Jul 7 15:55:28 newdogma sshd[29768]: Failed password for backup from 87.122.83.204 port 44038 ssh2 Jul 7 15:55:30 newdogma sshd[29768]: Received disconnect from 87.122.83.204 port 44038:11: Bye Bye [preauth] Jul 7 15:55:30 newdogma sshd[29768]: Disconnected from authenticating user backup 87.122.83.204 port 44038 [preauth] Jul 7 16:01:36 newdogma sshd[29858]: Invalid user xuzx from 87.122.83.204 port 44050 Jul 7 16:01:36 newdogma sshd[29858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.122.83.204 Jul 7 16:01:38 newdogma sshd[29858]: Failed password for invalid user xuzx from 87.122.83.204 port 44050 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=87.122.83.204 |
2020-07-08 22:09:15 |
111.59.83.16 | attackspambots | 1433/tcp 1433/tcp 1433/tcp [2020-05-15/07-08]3pkt |
2020-07-08 22:24:20 |
114.33.120.249 | attackspam | 85/tcp 8080/tcp 81/tcp... [2020-06-19/07-08]4pkt,3pt.(tcp) |
2020-07-08 22:16:08 |
80.80.168.36 | attack | 445/tcp 445/tcp 445/tcp... [2020-05-16/07-08]6pkt,1pt.(tcp) |
2020-07-08 22:25:03 |
162.243.139.246 | attack | [Wed Jun 17 21:52:32 2020] - DDoS Attack From IP: 162.243.139.246 Port: 58139 |
2020-07-08 22:37:05 |
49.246.143.10 | attack | Lines containing failures of 49.246.143.10 Jul 7 22:01:42 shared02 sshd[28092]: Invalid user yizhi from 49.246.143.10 port 39674 Jul 7 22:01:42 shared02 sshd[28092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.246.143.10 Jul 7 22:01:43 shared02 sshd[28092]: Failed password for invalid user yizhi from 49.246.143.10 port 39674 ssh2 Jul 7 22:01:43 shared02 sshd[28092]: Received disconnect from 49.246.143.10 port 39674:11: Bye Bye [preauth] Jul 7 22:01:43 shared02 sshd[28092]: Disconnected from invalid user yizhi 49.246.143.10 port 39674 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=49.246.143.10 |
2020-07-08 22:23:16 |
192.35.169.48 | attack | [LAN access from remote] from 192.35.169.48:9470 to 192.168.0.221:8091, Wednesday, July 08, 2020 01:10:20 |
2020-07-08 22:33:54 |
89.163.221.77 | attackspam | Jul 5 07:21:49 mxgate1 postfix/postscreen[20543]: CONNECT from [89.163.221.77]:50368 to [176.31.12.44]:25 Jul 5 07:21:49 mxgate1 postfix/postscreen[20543]: PASS OLD [89.163.221.77]:50368 Jul 5 07:21:49 mxgate1 postfix/smtpd[20549]: connect from er221.po77.seorazor.com[89.163.221.77] Jul x@x Jul 5 07:21:49 mxgate1 postfix/smtpd[20549]: disconnect from er221.po77.seorazor.com[89.163.221.77] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 commands=5/6 Jul 5 08:21:49 mxgate1 postfix/postscreen[22290]: CONNECT from [89.163.221.77]:60212 to [176.31.12.44]:25 Jul 5 08:21:49 mxgate1 postfix/postscreen[22290]: PASS OLD [89.163.221.77]:60212 Jul 5 08:21:49 mxgate1 postfix/smtpd[22296]: connect from er221.po77.seorazor.com[89.163.221.77] Jul x@x Jul 5 08:21:50 mxgate1 postfix/smtpd[22296]: disconnect from er221.po77.seorazor.com[89.163.221.77] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 commands=5/6 Jul 5 09:21:52 mxgate1 postfix/postscreen[23974]: CONNECT from [89.163......... ------------------------------- |
2020-07-08 22:01:05 |
128.199.238.110 | attackspam | Jul 8 10:03:02 ny01 sshd[24195]: Failed password for sys from 128.199.238.110 port 41816 ssh2 Jul 8 10:07:19 ny01 sshd[24786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.238.110 Jul 8 10:07:22 ny01 sshd[24786]: Failed password for invalid user rpcuser from 128.199.238.110 port 39698 ssh2 |
2020-07-08 22:20:37 |
36.112.108.195 | attackbots | 2020-07-08T18:42:52.926586hostname sshd[32276]: Invalid user dana from 36.112.108.195 port 12107 2020-07-08T18:42:55.080787hostname sshd[32276]: Failed password for invalid user dana from 36.112.108.195 port 12107 ssh2 2020-07-08T18:47:32.037014hostname sshd[1845]: Invalid user jxw from 36.112.108.195 port 31732 ... |
2020-07-08 22:05:34 |
106.223.80.138 | attackbots | 1594208847 - 07/08/2020 13:47:27 Host: 106.223.80.138/106.223.80.138 Port: 445 TCP Blocked |
2020-07-08 22:26:08 |
93.61.137.226 | attack | Jul 8 11:52:34 scw-tender-jepsen sshd[8910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.61.137.226 Jul 8 11:52:36 scw-tender-jepsen sshd[8910]: Failed password for invalid user mxx from 93.61.137.226 port 57190 ssh2 |
2020-07-08 22:03:15 |
40.70.203.157 | attackspambots | URL Probing: /wordpress/wp-includes/wlwmanifest.xml |
2020-07-08 22:07:43 |