City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
142.93.214.20 | attackbotsspam | Unauthorized connection attempt detected from IP address 142.93.214.20 to port 2220 [J] |
2020-02-03 05:47:36 |
142.93.214.20 | attack | Unauthorized connection attempt detected from IP address 142.93.214.20 to port 2220 [J] |
2020-02-02 14:14:06 |
142.93.214.20 | attackspambots | SSH Brute-Force attacks |
2020-01-11 23:01:06 |
142.93.214.20 | attackspambots | 2019-12-24T19:42:47.691176shield sshd\[17651\]: Invalid user manjul from 142.93.214.20 port 41604 2019-12-24T19:42:47.695731shield sshd\[17651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 2019-12-24T19:42:49.483794shield sshd\[17651\]: Failed password for invalid user manjul from 142.93.214.20 port 41604 ssh2 2019-12-24T19:45:30.306333shield sshd\[18230\]: Invalid user 123456 from 142.93.214.20 port 36402 2019-12-24T19:45:30.311080shield sshd\[18230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 |
2019-12-25 06:50:31 |
142.93.214.20 | attackspambots | Brute-force attempt banned |
2019-12-21 17:28:08 |
142.93.214.20 | attackspam | SSH brute-force: detected 10 distinct usernames within a 24-hour window. |
2019-12-21 05:15:01 |
142.93.214.20 | attack | Dec 19 17:35:42 sd-53420 sshd\[18450\]: User root from 142.93.214.20 not allowed because none of user's groups are listed in AllowGroups Dec 19 17:35:42 sd-53420 sshd\[18450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 user=root Dec 19 17:35:44 sd-53420 sshd\[18450\]: Failed password for invalid user root from 142.93.214.20 port 36492 ssh2 Dec 19 17:41:48 sd-53420 sshd\[20750\]: User root from 142.93.214.20 not allowed because none of user's groups are listed in AllowGroups Dec 19 17:41:48 sd-53420 sshd\[20750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 user=root ... |
2019-12-20 03:54:45 |
142.93.214.20 | attackspam | SSH Bruteforce attempt |
2019-12-16 14:10:34 |
142.93.214.20 | attackspam | Dec 10 22:36:35 server sshd\[31964\]: Invalid user guest from 142.93.214.20 Dec 10 22:36:35 server sshd\[31964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 Dec 10 22:36:37 server sshd\[31964\]: Failed password for invalid user guest from 142.93.214.20 port 57346 ssh2 Dec 10 22:43:41 server sshd\[1288\]: Invalid user tanja from 142.93.214.20 Dec 10 22:43:41 server sshd\[1288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 ... |
2019-12-11 07:16:23 |
142.93.214.20 | attackbotsspam | Dec 6 10:07:04 root sshd[13156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 Dec 6 10:07:06 root sshd[13156]: Failed password for invalid user test from 142.93.214.20 port 43690 ssh2 Dec 6 10:13:25 root sshd[13340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 ... |
2019-12-06 17:17:54 |
142.93.214.20 | attack | Invalid user hilliary from 142.93.214.20 port 41734 |
2019-11-26 16:49:53 |
142.93.214.20 | attackspambots | Brute-force attempt banned |
2019-11-19 03:35:00 |
142.93.214.20 | attackspam | Invalid user guest from 142.93.214.20 port 45864 |
2019-11-11 22:14:33 |
142.93.214.20 | attackspam | Nov 10 09:35:09 web9 sshd\[14364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 user=root Nov 10 09:35:12 web9 sshd\[14364\]: Failed password for root from 142.93.214.20 port 52310 ssh2 Nov 10 09:41:58 web9 sshd\[15476\]: Invalid user from 142.93.214.20 Nov 10 09:41:58 web9 sshd\[15476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 Nov 10 09:42:00 web9 sshd\[15476\]: Failed password for invalid user from 142.93.214.20 port 33376 ssh2 |
2019-11-11 03:52:19 |
142.93.214.20 | attackspambots | Nov 8 07:22:30 minden010 sshd[10581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 Nov 8 07:22:32 minden010 sshd[10581]: Failed password for invalid user All from 142.93.214.20 port 45216 ssh2 Nov 8 07:26:46 minden010 sshd[11427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 ... |
2019-11-08 17:57:21 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.214.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30970
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.214.90. IN A
;; AUTHORITY SECTION:
. 560 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 02:28:22 CST 2022
;; MSG SIZE rcvd: 106
Host 90.214.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 90.214.93.142.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
177.102.90.150 | attackbotsspam | Unauthorized connection attempt detected from IP address 177.102.90.150 to port 23 |
2020-05-13 03:19:15 |
190.72.83.36 | attackbots | Unauthorized connection attempt detected from IP address 190.72.83.36 to port 81 |
2020-05-13 02:38:00 |
201.68.133.225 | attack | Unauthorized connection attempt detected from IP address 201.68.133.225 to port 81 |
2020-05-13 03:08:39 |
178.117.251.238 | attackbots | Unauthorized connection attempt detected from IP address 178.117.251.238 to port 8089 |
2020-05-13 02:43:47 |
79.27.18.95 | attack | Unauthorized connection attempt detected from IP address 79.27.18.95 to port 23 |
2020-05-13 02:58:01 |
177.87.150.72 | attack | Unauthorized connection attempt detected from IP address 177.87.150.72 to port 23 |
2020-05-13 03:19:44 |
45.74.216.157 | attackbotsspam | Automatic report - Port Scan Attack |
2020-05-13 03:03:16 |
186.183.136.137 | attackspam | Unauthorized connection attempt detected from IP address 186.183.136.137 to port 23 |
2020-05-13 03:15:03 |
94.122.124.35 | attackbots | Unauthorized connection attempt detected from IP address 94.122.124.35 to port 23 |
2020-05-13 02:52:37 |
45.112.54.162 | attackspam | Unauthorized connection attempt detected from IP address 45.112.54.162 to port 445 |
2020-05-13 03:02:53 |
198.108.66.198 | attackbotsspam | Unauthorized connection attempt detected from IP address 198.108.66.198 to port 809 |
2020-05-13 03:10:43 |
87.27.63.229 | attack | Unauthorized connection attempt detected from IP address 87.27.63.229 to port 8000 |
2020-05-13 02:55:22 |
178.119.19.221 | attackspambots | Attempted connection to port 80. |
2020-05-13 03:18:31 |
118.179.81.130 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-13 02:50:45 |
200.194.47.168 | attackspambots | Unauthorized connection attempt detected from IP address 200.194.47.168 to port 23 |
2020-05-13 03:09:10 |