City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 142.93.58.2 | attackspambots | Malicious/Probing: //.env |
2020-08-01 04:51:32 |
| 142.93.58.2 | attackbotsspam | GET /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1 |
2020-07-27 21:19:47 |
| 142.93.58.2 | attackbotsspam | Forbidden directory scan :: 2020/07/26 13:50:01 [error] 3005#3005: *97002 access forbidden by rule, client: 142.93.58.2, server: [censored_1], request: "GET /.env HTTP/1.1", host: "www.[censored_1]" 2020/07/26 13:50:01 [error] 3005#3005: *97003 access forbidden by rule, client: 142.93.58.2, server: [censored_1], request: "GET /.env HTTP/1.1", host: "www.[censored_1]" |
2020-07-26 22:19:35 |
| 142.93.58.151 | attack | probes 12 times on the port 52869 |
2020-07-06 23:16:43 |
| 142.93.58.213 | attack | SSHAttack |
2019-10-27 04:58:55 |
| 142.93.58.123 | attackspambots | Sep 6 00:25:48 vps647732 sshd[23690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 Sep 6 00:25:50 vps647732 sshd[23690]: Failed password for invalid user 123456789 from 142.93.58.123 port 50090 ssh2 ... |
2019-09-06 06:26:37 |
| 142.93.58.123 | attackspam | Sep 4 03:55:10 web8 sshd\[19720\]: Invalid user vdr from 142.93.58.123 Sep 4 03:55:10 web8 sshd\[19720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 Sep 4 03:55:12 web8 sshd\[19720\]: Failed password for invalid user vdr from 142.93.58.123 port 51682 ssh2 Sep 4 03:58:52 web8 sshd\[21408\]: Invalid user apache from 142.93.58.123 Sep 4 03:58:52 web8 sshd\[21408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 |
2019-09-04 12:14:26 |
| 142.93.58.123 | attack | Sep 1 15:37:28 TORMINT sshd\[28373\]: Invalid user ezequiel123 from 142.93.58.123 Sep 1 15:37:28 TORMINT sshd\[28373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 Sep 1 15:37:31 TORMINT sshd\[28373\]: Failed password for invalid user ezequiel123 from 142.93.58.123 port 38724 ssh2 ... |
2019-09-02 03:52:42 |
| 142.93.58.123 | attackbots | Sep 1 02:52:11 ns341937 sshd[3151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 Sep 1 02:52:13 ns341937 sshd[3151]: Failed password for invalid user tommie from 142.93.58.123 port 52846 ssh2 Sep 1 03:03:08 ns341937 sshd[5185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 ... |
2019-09-01 10:41:46 |
| 142.93.58.123 | attackspam | SSH Bruteforce attack |
2019-08-20 13:15:31 |
| 142.93.58.123 | attackspam | Fail2Ban Ban Triggered |
2019-08-11 02:34:38 |
| 142.93.58.123 | attackspam | Aug 9 10:56:15 srv-4 sshd\[1982\]: Invalid user matthias from 142.93.58.123 Aug 9 10:56:15 srv-4 sshd\[1982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 Aug 9 10:56:17 srv-4 sshd\[1982\]: Failed password for invalid user matthias from 142.93.58.123 port 35420 ssh2 ... |
2019-08-10 01:06:10 |
| 142.93.58.123 | attackspam | Aug 2 17:21:01 xtremcommunity sshd\[20347\]: Invalid user teamspeak from 142.93.58.123 port 58700 Aug 2 17:21:01 xtremcommunity sshd\[20347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 Aug 2 17:21:03 xtremcommunity sshd\[20347\]: Failed password for invalid user teamspeak from 142.93.58.123 port 58700 ssh2 Aug 2 17:24:59 xtremcommunity sshd\[20524\]: Invalid user dana from 142.93.58.123 port 52552 Aug 2 17:24:59 xtremcommunity sshd\[20524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 ... |
2019-08-03 05:36:45 |
| 142.93.58.123 | attackspambots | 2019-08-01T05:26:33.780172abusebot-8.cloudsearch.cf sshd\[16483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123 user=root |
2019-08-01 17:24:56 |
| 142.93.58.123 | attack | Automatic report - Banned IP Access |
2019-07-28 17:59:34 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.58.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.58.128. IN A
;; AUTHORITY SECTION:
. 27 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:05:49 CST 2022
;; MSG SIZE rcvd: 106
Host 128.58.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 128.58.93.142.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 92.53.59.19 | attack | Autoban 92.53.59.19 AUTH/CONNECT |
2019-08-05 07:46:56 |
| 5.175.17.52 | attack | Port Scan: TCP/445 |
2019-08-05 08:31:39 |
| 1.169.21.81 | attackbotsspam | Port Scan: TCP/23 |
2019-08-05 08:32:24 |
| 41.41.87.22 | attackspam | 1564953312 - 08/05/2019 04:15:12 Host: host-41.41.87.22.tedata.net/41.41.87.22 Port: 23 TCP Blocked ... |
2019-08-05 08:10:32 |
| 91.134.154.161 | attackspam | Port Scan: TCP/80 |
2019-08-05 08:26:18 |
| 51.255.35.41 | attackspam | SSH invalid-user multiple login attempts |
2019-08-05 07:48:57 |
| 68.183.237.207 | attack | Aug 3 22:42:18 srv1 sshd[30368]: Invalid user legal1 from 68.183.237.207 Aug 3 22:42:18 srv1 sshd[30368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.237.207 Aug 3 22:42:20 srv1 sshd[30368]: Failed password for invalid user legal1 from 68.183.237.207 port 45910 ssh2 Aug 3 22:42:21 srv1 sshd[30369]: Received disconnect from 68.183.237.207: 11: Bye Bye ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=68.183.237.207 |
2019-08-05 07:47:51 |
| 92.222.69.243 | attack | Autoban 92.222.69.243 AUTH/CONNECT |
2019-08-05 07:58:02 |
| 138.68.111.27 | attackspam | (sshd) Failed SSH login from 138.68.111.27 (semako-01.weplay.space): 5 in the last 3600 secs |
2019-08-05 08:09:26 |
| 190.74.92.21 | attackbots | Port Scan: TCP/445 |
2019-08-05 08:18:20 |
| 92.53.21.233 | attack | Autoban 92.53.21.233 AUTH/CONNECT |
2019-08-05 07:47:26 |
| 116.54.12.154 | attackspambots | Port Scan: TCP/22 |
2019-08-05 08:23:06 |
| 3.87.31.145 | attack | Port Scan: TCP/8080 |
2019-08-05 08:32:05 |
| 92.6.115.55 | attack | Autoban 92.6.115.55 AUTH/CONNECT |
2019-08-05 07:44:13 |
| 203.154.71.40 | attackbots | WordPress login Brute force / Web App Attack on client site. |
2019-08-05 08:08:21 |