City: unknown
Region: unknown
Country: United States
Internet Service Provider: DigitalOcean LLC
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attack | Automatic report - Banned IP Access |
2019-07-18 20:09:45 |
attack | [munged]::80 142.93.214.242 - - [13/Jul/2019:06:32:27 +0200] "POST /[munged]: HTTP/1.1" 403 3925 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::80 142.93.214.242 - - [13/Jul/2019:06:32:34 +0200] "POST /[munged]: HTTP/1.1" 403 3925 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-07-13 12:45:55 |
attackspam | WordPress brute force |
2019-07-12 20:12:27 |
attack | Automatic report - Web App Attack |
2019-07-06 06:09:50 |
attackbots | 142.93.214.242 - - [28/Jun/2019:07:11:51 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.214.242 - - [28/Jun/2019:07:11:52 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.214.242 - - [28/Jun/2019:07:11:53 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.214.242 - - [28/Jun/2019:07:11:54 +0200] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.214.242 - - [28/Jun/2019:07:11:59 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.214.242 - - [28/Jun/2019:07:12:01 +0200] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-06-28 16:53:38 |
attackbots | wp brute-force |
2019-06-23 17:05:40 |
IP | Type | Details | Datetime |
---|---|---|---|
142.93.214.20 | attackbotsspam | Unauthorized connection attempt detected from IP address 142.93.214.20 to port 2220 [J] |
2020-02-03 05:47:36 |
142.93.214.20 | attack | Unauthorized connection attempt detected from IP address 142.93.214.20 to port 2220 [J] |
2020-02-02 14:14:06 |
142.93.214.20 | attackspambots | SSH Brute-Force attacks |
2020-01-11 23:01:06 |
142.93.214.20 | attackspambots | 2019-12-24T19:42:47.691176shield sshd\[17651\]: Invalid user manjul from 142.93.214.20 port 41604 2019-12-24T19:42:47.695731shield sshd\[17651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 2019-12-24T19:42:49.483794shield sshd\[17651\]: Failed password for invalid user manjul from 142.93.214.20 port 41604 ssh2 2019-12-24T19:45:30.306333shield sshd\[18230\]: Invalid user 123456 from 142.93.214.20 port 36402 2019-12-24T19:45:30.311080shield sshd\[18230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 |
2019-12-25 06:50:31 |
142.93.214.20 | attackspambots | Brute-force attempt banned |
2019-12-21 17:28:08 |
142.93.214.20 | attackspam | SSH brute-force: detected 10 distinct usernames within a 24-hour window. |
2019-12-21 05:15:01 |
142.93.214.20 | attack | Dec 19 17:35:42 sd-53420 sshd\[18450\]: User root from 142.93.214.20 not allowed because none of user's groups are listed in AllowGroups Dec 19 17:35:42 sd-53420 sshd\[18450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 user=root Dec 19 17:35:44 sd-53420 sshd\[18450\]: Failed password for invalid user root from 142.93.214.20 port 36492 ssh2 Dec 19 17:41:48 sd-53420 sshd\[20750\]: User root from 142.93.214.20 not allowed because none of user's groups are listed in AllowGroups Dec 19 17:41:48 sd-53420 sshd\[20750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 user=root ... |
2019-12-20 03:54:45 |
142.93.214.20 | attackspam | SSH Bruteforce attempt |
2019-12-16 14:10:34 |
142.93.214.20 | attackspam | Dec 10 22:36:35 server sshd\[31964\]: Invalid user guest from 142.93.214.20 Dec 10 22:36:35 server sshd\[31964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 Dec 10 22:36:37 server sshd\[31964\]: Failed password for invalid user guest from 142.93.214.20 port 57346 ssh2 Dec 10 22:43:41 server sshd\[1288\]: Invalid user tanja from 142.93.214.20 Dec 10 22:43:41 server sshd\[1288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 ... |
2019-12-11 07:16:23 |
142.93.214.20 | attackbotsspam | Dec 6 10:07:04 root sshd[13156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 Dec 6 10:07:06 root sshd[13156]: Failed password for invalid user test from 142.93.214.20 port 43690 ssh2 Dec 6 10:13:25 root sshd[13340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 ... |
2019-12-06 17:17:54 |
142.93.214.20 | attack | Invalid user hilliary from 142.93.214.20 port 41734 |
2019-11-26 16:49:53 |
142.93.214.20 | attackspambots | Brute-force attempt banned |
2019-11-19 03:35:00 |
142.93.214.20 | attackspam | Invalid user guest from 142.93.214.20 port 45864 |
2019-11-11 22:14:33 |
142.93.214.20 | attackspam | Nov 10 09:35:09 web9 sshd\[14364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 user=root Nov 10 09:35:12 web9 sshd\[14364\]: Failed password for root from 142.93.214.20 port 52310 ssh2 Nov 10 09:41:58 web9 sshd\[15476\]: Invalid user from 142.93.214.20 Nov 10 09:41:58 web9 sshd\[15476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 Nov 10 09:42:00 web9 sshd\[15476\]: Failed password for invalid user from 142.93.214.20 port 33376 ssh2 |
2019-11-11 03:52:19 |
142.93.214.20 | attackspambots | Nov 8 07:22:30 minden010 sshd[10581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 Nov 8 07:22:32 minden010 sshd[10581]: Failed password for invalid user All from 142.93.214.20 port 45216 ssh2 Nov 8 07:26:46 minden010 sshd[11427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 ... |
2019-11-08 17:57:21 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.214.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40419
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.93.214.242. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019060801 1800 900 604800 86400
;; Query time: 248 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 09 12:21:47 CST 2019
;; MSG SIZE rcvd: 118
242.214.93.142.in-addr.arpa domain name pointer acuteagro.biz.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
242.214.93.142.in-addr.arpa name = acuteagro.biz.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
69.229.0.133 | attackspam | Honeypot attack, port: 23, PTR: PTR record not found |
2020-01-05 02:26:16 |
1.52.238.49 | attackspambots | Unauthorized connection attempt detected from IP address 1.52.238.49 to port 23 [J] |
2020-01-05 02:09:07 |
201.24.82.11 | attack | Unauthorized connection attempt detected from IP address 201.24.82.11 to port 445 [J] |
2020-01-05 02:34:26 |
95.5.8.59 | attackspambots | Unauthorized connection attempt detected from IP address 95.5.8.59 to port 23 [J] |
2020-01-05 02:23:16 |
188.191.164.109 | attack | Unauthorized connection attempt detected from IP address 188.191.164.109 to port 23 [J] |
2020-01-05 02:37:27 |
178.176.105.82 | attackbotsspam | Unauthorized connection attempt detected from IP address 178.176.105.82 to port 2220 [J] |
2020-01-05 02:14:22 |
111.207.1.170 | attackspambots | Unauthorized connection attempt detected from IP address 111.207.1.170 to port 1433 [J] |
2020-01-05 02:43:05 |
14.37.27.205 | attackbots | Unauthorized connection attempt detected from IP address 14.37.27.205 to port 4567 [J] |
2020-01-05 02:07:31 |
82.153.166.86 | attackspam | Unauthorized connection attempt detected from IP address 82.153.166.86 to port 81 [J] |
2020-01-05 02:45:59 |
113.196.186.194 | attackspambots | 20/1/4@09:31:24: FAIL: Alarm-Network address from=113.196.186.194 ... |
2020-01-05 02:42:47 |
187.162.142.244 | attackbotsspam | Unauthorized connection attempt detected from IP address 187.162.142.244 to port 23 [J] |
2020-01-05 02:12:55 |
124.124.44.157 | attack | Unauthorized connection attempt detected from IP address 124.124.44.157 to port 23 [J] |
2020-01-05 02:40:42 |
49.51.8.99 | attackspambots | Unauthorized connection attempt detected from IP address 49.51.8.99 to port 8182 |
2020-01-05 02:05:49 |
188.211.190.182 | attackspambots | Unauthorized connection attempt detected from IP address 188.211.190.182 to port 2323 [J] |
2020-01-05 02:36:57 |
169.1.116.179 | attackspambots | Unauthorized connection attempt detected from IP address 169.1.116.179 to port 5555 [J] |
2020-01-05 02:15:27 |