City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
142.93.254.122 | attackspambots | Oct 10 20:09:39 inter-technics sshd[11805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.122 user=root Oct 10 20:09:41 inter-technics sshd[11805]: Failed password for root from 142.93.254.122 port 33758 ssh2 Oct 10 20:12:56 inter-technics sshd[12017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.122 user=root Oct 10 20:12:58 inter-technics sshd[12017]: Failed password for root from 142.93.254.122 port 57502 ssh2 Oct 10 20:16:13 inter-technics sshd[12206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.122 user=root Oct 10 20:16:15 inter-technics sshd[12206]: Failed password for root from 142.93.254.122 port 53016 ssh2 ... |
2020-10-11 04:57:50 |
142.93.254.122 | attackspam | $f2bV_matches |
2020-10-10 20:58:56 |
142.93.254.122 | attackbots | Oct 8 22:32:36 jane sshd[771]: Failed password for root from 142.93.254.122 port 57012 ssh2 ... |
2020-10-09 05:04:49 |
142.93.254.122 | attack | Oct 8 14:44:18 ip106 sshd[12290]: Failed password for root from 142.93.254.122 port 52914 ssh2 ... |
2020-10-08 21:17:36 |
142.93.254.122 | attack | Lines containing failures of 142.93.254.122 Oct 5 07:35:21 dns01 sshd[2030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.122 user=r.r Oct 5 07:35:23 dns01 sshd[2030]: Failed password for r.r from 142.93.254.122 port 53318 ssh2 Oct 5 07:35:23 dns01 sshd[2030]: Received disconnect from 142.93.254.122 port 53318:11: Bye Bye [preauth] Oct 5 07:35:23 dns01 sshd[2030]: Disconnected from authenticating user r.r 142.93.254.122 port 53318 [preauth] Oct 5 07:46:09 dns01 sshd[4012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.122 user=r.r Oct 5 07:46:11 dns01 sshd[4012]: Failed password for r.r from 142.93.254.122 port 41690 ssh2 Oct 5 07:46:11 dns01 sshd[4012]: Received disconnect from 142.93.254.122 port 41690:11: Bye Bye [preauth] Oct 5 07:46:11 dns01 sshd[4012]: Disconnected from authenticating user r.r 142.93.254.122 port 41690 [preauth] Oct 5 07:50:05 dns01........ ------------------------------ |
2020-10-08 13:11:30 |
142.93.254.122 | attackbots | Lines containing failures of 142.93.254.122 Oct 5 07:35:21 dns01 sshd[2030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.122 user=r.r Oct 5 07:35:23 dns01 sshd[2030]: Failed password for r.r from 142.93.254.122 port 53318 ssh2 Oct 5 07:35:23 dns01 sshd[2030]: Received disconnect from 142.93.254.122 port 53318:11: Bye Bye [preauth] Oct 5 07:35:23 dns01 sshd[2030]: Disconnected from authenticating user r.r 142.93.254.122 port 53318 [preauth] Oct 5 07:46:09 dns01 sshd[4012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.254.122 user=r.r Oct 5 07:46:11 dns01 sshd[4012]: Failed password for r.r from 142.93.254.122 port 41690 ssh2 Oct 5 07:46:11 dns01 sshd[4012]: Received disconnect from 142.93.254.122 port 41690:11: Bye Bye [preauth] Oct 5 07:46:11 dns01 sshd[4012]: Disconnected from authenticating user r.r 142.93.254.122 port 41690 [preauth] Oct 5 07:50:05 dns01........ ------------------------------ |
2020-10-08 08:32:32 |
142.93.251.1 | attackspambots | Sep 1 00:40:44 george sshd[32473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 Sep 1 00:40:46 george sshd[32473]: Failed password for invalid user test from 142.93.251.1 port 38168 ssh2 Sep 1 00:44:15 george sshd[32485]: Invalid user wyb from 142.93.251.1 port 44322 Sep 1 00:44:15 george sshd[32485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 Sep 1 00:44:17 george sshd[32485]: Failed password for invalid user wyb from 142.93.251.1 port 44322 ssh2 ... |
2020-09-01 13:06:47 |
142.93.251.1 | attack | 2020-08-17T13:57:31.566880ns386461 sshd\[6807\]: Invalid user mce from 142.93.251.1 port 40200 2020-08-17T13:57:31.571547ns386461 sshd\[6807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 2020-08-17T13:57:33.648007ns386461 sshd\[6807\]: Failed password for invalid user mce from 142.93.251.1 port 40200 ssh2 2020-08-17T14:07:00.342226ns386461 sshd\[15025\]: Invalid user admin from 142.93.251.1 port 53874 2020-08-17T14:07:00.346866ns386461 sshd\[15025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 ... |
2020-08-17 20:11:49 |
142.93.251.1 | attackspam | Aug 6 21:49:19 jumpserver sshd[48200]: Failed password for root from 142.93.251.1 port 53304 ssh2 Aug 6 21:53:15 jumpserver sshd[48243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 user=root Aug 6 21:53:17 jumpserver sshd[48243]: Failed password for root from 142.93.251.1 port 37328 ssh2 ... |
2020-08-07 07:46:42 |
142.93.251.209 | attackbots | Email address rejected |
2020-08-07 04:35:07 |
142.93.251.1 | attackspambots | 2020-08-03T08:27:32.249366sorsha.thespaminator.com sshd[21114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 user=root 2020-08-03T08:27:34.559282sorsha.thespaminator.com sshd[21114]: Failed password for root from 142.93.251.1 port 36582 ssh2 ... |
2020-08-03 21:31:12 |
142.93.251.1 | attackbotsspam | 2020-07-30T16:43:57.918119mail.standpoint.com.ua sshd[12411]: Invalid user jishanling from 142.93.251.1 port 38102 2020-07-30T16:43:57.921377mail.standpoint.com.ua sshd[12411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 2020-07-30T16:43:57.918119mail.standpoint.com.ua sshd[12411]: Invalid user jishanling from 142.93.251.1 port 38102 2020-07-30T16:43:59.475970mail.standpoint.com.ua sshd[12411]: Failed password for invalid user jishanling from 142.93.251.1 port 38102 ssh2 2020-07-30T16:48:03.260055mail.standpoint.com.ua sshd[12985]: Invalid user jhua from 142.93.251.1 port 50636 ... |
2020-07-30 21:57:53 |
142.93.251.1 | attack | Jul 22 17:27:59 home sshd[148847]: Invalid user asterisk from 142.93.251.1 port 50084 Jul 22 17:27:59 home sshd[148847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 Jul 22 17:27:59 home sshd[148847]: Invalid user asterisk from 142.93.251.1 port 50084 Jul 22 17:28:01 home sshd[148847]: Failed password for invalid user asterisk from 142.93.251.1 port 50084 ssh2 Jul 22 17:32:35 home sshd[149363]: Invalid user wrk from 142.93.251.1 port 37956 ... |
2020-07-23 03:51:58 |
142.93.251.1 | attack | Jun 30 13:44:51 lanister sshd[18538]: Failed password for invalid user xbox from 142.93.251.1 port 33582 ssh2 Jun 30 13:44:49 lanister sshd[18538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 Jun 30 13:44:49 lanister sshd[18538]: Invalid user xbox from 142.93.251.1 Jun 30 13:44:51 lanister sshd[18538]: Failed password for invalid user xbox from 142.93.251.1 port 33582 ssh2 |
2020-07-02 01:04:24 |
142.93.251.1 | attack | Jun 27 15:32:05 itv-usvr-02 sshd[16831]: Invalid user webuser from 142.93.251.1 port 40970 Jun 27 15:32:05 itv-usvr-02 sshd[16831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1 Jun 27 15:32:05 itv-usvr-02 sshd[16831]: Invalid user webuser from 142.93.251.1 port 40970 Jun 27 15:32:07 itv-usvr-02 sshd[16831]: Failed password for invalid user webuser from 142.93.251.1 port 40970 ssh2 Jun 27 15:35:49 itv-usvr-02 sshd[16940]: Invalid user adrian from 142.93.251.1 port 40880 |
2020-06-27 18:00:08 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.25.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25334
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.25.191. IN A
;; AUTHORITY SECTION:
. 157 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:40:40 CST 2022
;; MSG SIZE rcvd: 106
Host 191.25.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 191.25.93.142.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
217.216.133.160 | attackspambots | 2020-08-30T14:11:04.353733h2857900.stratoserver.net sshd[7853]: Invalid user pi from 217.216.133.160 port 55222 2020-08-30T14:11:04.353756h2857900.stratoserver.net sshd[7852]: Invalid user pi from 217.216.133.160 port 55230 ... |
2020-08-31 03:40:48 |
155.94.160.110 | attackbots | Multiple SSH authentication failures from 155.94.160.110 |
2020-08-31 03:44:12 |
42.203.39.4 | attackbots | Aug 30 15:57:47 eventyay sshd[18542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.203.39.4 Aug 30 15:57:49 eventyay sshd[18542]: Failed password for invalid user es from 42.203.39.4 port 59598 ssh2 Aug 30 16:00:59 eventyay sshd[18706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.203.39.4 ... |
2020-08-31 03:56:12 |
222.186.42.155 | attackbots | 2020-08-30T22:05[Censored Hostname] sshd[38062]: Failed password for root from 222.186.42.155 port 25789 ssh2 2020-08-30T22:05[Censored Hostname] sshd[38062]: Failed password for root from 222.186.42.155 port 25789 ssh2 2020-08-30T22:05[Censored Hostname] sshd[38062]: Failed password for root from 222.186.42.155 port 25789 ssh2[...] |
2020-08-31 04:10:58 |
81.68.141.71 | attackspambots | $f2bV_matches |
2020-08-31 03:46:24 |
45.142.120.53 | attack | 2020-08-30 23:02:42 dovecot_login authenticator failed for \(User\) \[45.142.120.53\]: 535 Incorrect authentication data \(set_id=tests@org.ua\)2020-08-30 23:03:19 dovecot_login authenticator failed for \(User\) \[45.142.120.53\]: 535 Incorrect authentication data \(set_id=backdoor@org.ua\)2020-08-30 23:03:56 dovecot_login authenticator failed for \(User\) \[45.142.120.53\]: 535 Incorrect authentication data \(set_id=hamlet@org.ua\) ... |
2020-08-31 04:09:49 |
41.208.68.29 | attackbots | 4409/tcp [2020-08-30]1pkt |
2020-08-31 04:02:27 |
51.79.66.198 | attackbots | $f2bV_matches |
2020-08-31 03:52:27 |
171.244.48.33 | attackbots | Aug 30 18:23:00 l02a sshd[4414]: Invalid user imj from 171.244.48.33 Aug 30 18:23:00 l02a sshd[4414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.48.33 Aug 30 18:23:00 l02a sshd[4414]: Invalid user imj from 171.244.48.33 Aug 30 18:23:02 l02a sshd[4414]: Failed password for invalid user imj from 171.244.48.33 port 60162 ssh2 |
2020-08-31 04:04:55 |
172.96.16.86 | attackspambots | Aug 30 15:01:59 george sshd[6676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.16.86 user=root Aug 30 15:02:02 george sshd[6676]: Failed password for root from 172.96.16.86 port 38098 ssh2 Aug 30 15:07:18 george sshd[6718]: Invalid user webuser from 172.96.16.86 port 44896 Aug 30 15:07:18 george sshd[6718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.16.86 Aug 30 15:07:19 george sshd[6718]: Failed password for invalid user webuser from 172.96.16.86 port 44896 ssh2 ... |
2020-08-31 04:17:39 |
125.91.109.200 | attackspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-31 04:16:02 |
202.88.237.15 | attackbotsspam | Aug 30 20:57:53 MainVPS sshd[6480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.237.15 user=root Aug 30 20:57:54 MainVPS sshd[6480]: Failed password for root from 202.88.237.15 port 59444 ssh2 Aug 30 21:03:43 MainVPS sshd[16500]: Invalid user uftp from 202.88.237.15 port 54344 Aug 30 21:03:43 MainVPS sshd[16500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.237.15 Aug 30 21:03:43 MainVPS sshd[16500]: Invalid user uftp from 202.88.237.15 port 54344 Aug 30 21:03:45 MainVPS sshd[16500]: Failed password for invalid user uftp from 202.88.237.15 port 54344 ssh2 ... |
2020-08-31 03:59:17 |
190.111.246.168 | attackbotsspam | 2020-08-30T08:11:04.667055linuxbox-skyline sshd[35939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.246.168 user=root 2020-08-30T08:11:05.918389linuxbox-skyline sshd[35939]: Failed password for root from 190.111.246.168 port 34817 ssh2 ... |
2020-08-31 03:57:18 |
85.185.161.202 | attackspambots | $f2bV_matches |
2020-08-31 04:07:14 |
139.59.95.60 | attackbotsspam | Time: Sun Aug 30 14:05:12 2020 +0200 IP: 139.59.95.60 (IN/India/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Aug 30 13:53:49 mail-01 sshd[1573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.95.60 user=root Aug 30 13:53:51 mail-01 sshd[1573]: Failed password for root from 139.59.95.60 port 56396 ssh2 Aug 30 14:01:06 mail-01 sshd[6980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.95.60 user=zabbix Aug 30 14:01:08 mail-01 sshd[6980]: Failed password for zabbix from 139.59.95.60 port 33982 ssh2 Aug 30 14:05:08 mail-01 sshd[7372]: Invalid user couchdb from 139.59.95.60 port 36182 |
2020-08-31 03:42:46 |