City: unknown
Region: unknown
Country: China
Internet Service Provider: The China Education and Research Network
Hostname: unknown
Organization: unknown
Usage Type: University/College/School
| Type | Details | Datetime |
|---|---|---|
| attack | The IP has triggered Cloudflare WAF. CF-Ray: 5436c0f51942e7a4 | WAF_Rule_ID: 1025440 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-12 06:11:26 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2001:da8:20b:200:100::3a
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2001:da8:20b:200:100::3a. IN A
;; AUTHORITY SECTION:
. 10800 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019121101 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 100.100.2.136#53(100.100.2.136)
;; WHEN: Thu Dec 12 06:25:10 CST 2019
;; MSG SIZE rcvd: 128
Host a.3.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.0.2.0.b.0.2.0.8.a.d.0.1.0.0.2.ip6.arpa not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find a.3.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.0.2.0.b.0.2.0.8.a.d.0.1.0.0.2.ip6.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 173.164.173.36 | attackbots | Aug 13 20:48:49 xtremcommunity sshd\[21120\]: Invalid user redmine from 173.164.173.36 port 50382 Aug 13 20:48:49 xtremcommunity sshd\[21120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.164.173.36 Aug 13 20:48:52 xtremcommunity sshd\[21120\]: Failed password for invalid user redmine from 173.164.173.36 port 50382 ssh2 Aug 13 20:52:51 xtremcommunity sshd\[21249\]: Invalid user ftp_test from 173.164.173.36 port 41358 Aug 13 20:52:51 xtremcommunity sshd\[21249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.164.173.36 ... |
2019-08-14 08:53:16 |
| 185.238.48.193 | attack | Mail sent to address obtained from MySpace hack |
2019-08-14 08:28:39 |
| 49.50.76.29 | attackspambots | Aug 14 03:44:15 server sshd\[10297\]: Invalid user raphael from 49.50.76.29 port 48042 Aug 14 03:44:15 server sshd\[10297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.50.76.29 Aug 14 03:44:17 server sshd\[10297\]: Failed password for invalid user raphael from 49.50.76.29 port 48042 ssh2 Aug 14 03:51:26 server sshd\[28299\]: Invalid user wallimo_phpbb1 from 49.50.76.29 port 39390 Aug 14 03:51:26 server sshd\[28299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.50.76.29 |
2019-08-14 08:58:33 |
| 222.188.98.43 | attack | $f2bV_matches |
2019-08-14 08:43:33 |
| 154.8.217.73 | attack | $f2bV_matches |
2019-08-14 09:02:59 |
| 82.213.223.51 | attackbots | " " |
2019-08-14 08:52:43 |
| 160.153.153.30 | attackbots | Automatic report - Banned IP Access |
2019-08-14 08:41:49 |
| 128.14.136.158 | attackspambots | SSH authentication failure x 6 reported by Fail2Ban ... |
2019-08-14 08:42:40 |
| 104.206.128.22 | attackspam | " " |
2019-08-14 08:36:31 |
| 41.93.40.16 | attackspam | DATE:2019-08-14 01:22:04, IP:41.93.40.16, PORT:ssh SSH brute force auth (ermes) |
2019-08-14 08:45:48 |
| 81.22.45.106 | attackspambots | 08/13/2019-14:18:06.048015 81.22.45.106 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-08-14 08:52:21 |
| 178.128.55.49 | attack | Aug 14 02:16:00 vmd17057 sshd\[21082\]: Invalid user cgb from 178.128.55.49 port 41012 Aug 14 02:16:00 vmd17057 sshd\[21082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.49 Aug 14 02:16:02 vmd17057 sshd\[21082\]: Failed password for invalid user cgb from 178.128.55.49 port 41012 ssh2 ... |
2019-08-14 09:01:32 |
| 198.245.53.163 | attack | Aug 14 02:30:13 nextcloud sshd\[1137\]: Invalid user test from 198.245.53.163 Aug 14 02:30:13 nextcloud sshd\[1137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.53.163 Aug 14 02:30:16 nextcloud sshd\[1137\]: Failed password for invalid user test from 198.245.53.163 port 55130 ssh2 ... |
2019-08-14 08:40:03 |
| 186.248.107.102 | attack | Mail sent to address hacked/leaked from Last.fm |
2019-08-14 08:27:36 |
| 92.32.68.230 | attackbots | Aug 13 21:18:25 srv-4 sshd\[23074\]: Invalid user pi from 92.32.68.230 Aug 13 21:18:25 srv-4 sshd\[23073\]: Invalid user pi from 92.32.68.230 Aug 13 21:18:25 srv-4 sshd\[23074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.32.68.230 Aug 13 21:18:25 srv-4 sshd\[23073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.32.68.230 ... |
2019-08-14 08:42:22 |