City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: Capital Online Data Service HK Co Ltd
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attack | firewall-block, port(s): 1521/tcp |
2019-11-21 21:50:49 |
attackbotsspam | 11/11/2019-23:43:34.705122 164.52.42.134 Protocol: 6 ET SCAN Suspicious inbound to Oracle SQL port 1521 |
2019-11-12 07:22:49 |
IP | Type | Details | Datetime |
---|---|---|---|
164.52.42.6 | attack | May 24 05:41:23 web01.agentur-b-2.de postfix/smtpd[512662]: NOQUEUE: reject: RCPT from unknown[164.52.42.6]: 554 5.7.1 Service unavailable; Client host [164.52.42.6] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/164.52.42.6; from= |
2020-05-24 20:08:10 |
164.52.42.6 | attackbotsspam | Unauthorized connection attempt from IP address 164.52.42.6 on Port 445(SMB) |
2019-10-26 02:11:26 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.52.42.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.52.42.134. IN A
;; AUTHORITY SECTION:
. 361 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019111101 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 12 07:22:44 CST 2019
;; MSG SIZE rcvd: 117
Host 134.42.52.164.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 100.100.2.138, trying next server
** server can't find 134.42.52.164.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
106.104.115.213 | attackspam | unauthorized connection attempt |
2020-02-19 15:55:26 |
121.164.60.230 | attack | unauthorized connection attempt |
2020-02-19 16:11:01 |
143.202.116.93 | attackspam | unauthorized connection attempt |
2020-02-19 16:34:07 |
177.93.70.234 | attackbotsspam | unauthorized connection attempt |
2020-02-19 15:52:21 |
117.54.222.18 | attack | unauthorized connection attempt |
2020-02-19 16:28:57 |
81.91.239.148 | attackspambots | unauthorized connection attempt |
2020-02-19 16:13:32 |
14.240.95.166 | attack | Port 9530 scan denied |
2020-02-19 16:31:54 |
113.22.10.172 | attack | 1582088190 - 02/19/2020 05:56:30 Host: 113.22.10.172/113.22.10.172 Port: 445 TCP Blocked |
2020-02-19 16:06:06 |
116.232.164.120 | attackbots | unauthorized connection attempt |
2020-02-19 16:12:03 |
212.156.69.114 | attackbots | unauthorized connection attempt |
2020-02-19 15:50:48 |
27.208.44.144 | attack | unauthorized connection attempt |
2020-02-19 16:15:40 |
92.87.113.71 | attackspam | unauthorized connection attempt |
2020-02-19 15:56:42 |
162.241.65.175 | attack | Feb 19 05:56:26 ArkNodeAT sshd\[22403\]: Invalid user ts3 from 162.241.65.175 Feb 19 05:56:26 ArkNodeAT sshd\[22403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.65.175 Feb 19 05:56:27 ArkNodeAT sshd\[22403\]: Failed password for invalid user ts3 from 162.241.65.175 port 58936 ssh2 |
2020-02-19 15:53:12 |
119.202.22.168 | attack | unauthorized connection attempt |
2020-02-19 16:11:32 |
52.16.36.128 | attackspam | unauthorized connection attempt |
2020-02-19 15:57:05 |