City: Zhuhai
Region: Guangdong
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: China Unicom IP network China169 Guangdong province
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
27.42.105.155 | attackspam | Email rejected due to spam filtering |
2020-04-25 21:48:59 |
27.42.109.252 | attackspambots | Unauthorized connection attempt detected from IP address 27.42.109.252 to port 1433 [J] |
2020-02-04 04:21:18 |
27.42.109.158 | attackspam | unauthorized connection attempt |
2020-01-09 18:09:27 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.42.10.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13266
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;27.42.10.92. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019050700 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue May 07 20:47:23 +08 2019
;; MSG SIZE rcvd: 115
Host 92.10.42.27.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 92.10.42.27.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
170.150.72.28 | attack | Jul 3 19:25:29 Tower sshd[25941]: Connection from 170.150.72.28 port 32914 on 192.168.10.220 port 22 rdomain "" Jul 3 19:25:30 Tower sshd[25941]: Failed password for root from 170.150.72.28 port 32914 ssh2 Jul 3 19:25:30 Tower sshd[25941]: Received disconnect from 170.150.72.28 port 32914:11: Bye Bye [preauth] Jul 3 19:25:30 Tower sshd[25941]: Disconnected from authenticating user root 170.150.72.28 port 32914 [preauth] |
2020-07-04 07:57:36 |
168.61.177.37 | attackspam | Jul 3 23:27:45 vps1 sshd[2191694]: Invalid user tomcat from 168.61.177.37 port 51398 Jul 3 23:27:47 vps1 sshd[2191694]: Failed password for invalid user tomcat from 168.61.177.37 port 51398 ssh2 ... |
2020-07-04 07:41:43 |
121.180.9.109 | attackbotsspam | Automatic report - Port Scan Attack |
2020-07-04 07:43:47 |
49.233.202.231 | attackbots | Jul 4 00:26:56 rocket sshd[23285]: Failed password for root from 49.233.202.231 port 35602 ssh2 Jul 4 00:36:53 rocket sshd[24002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.202.231 ... |
2020-07-04 07:48:02 |
61.177.172.54 | attackspambots | Jul 4 01:35:45 sd-69548 sshd[3591768]: Unable to negotiate with 61.177.172.54 port 31152: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Jul 4 02:11:18 sd-69548 sshd[3594185]: Unable to negotiate with 61.177.172.54 port 31730: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-07-04 08:11:56 |
125.231.16.70 | attackspam | Icarus honeypot on github |
2020-07-04 07:49:37 |
114.32.192.101 | attack | Jul 4 01:17:24 debian-2gb-nbg1-2 kernel: \[16076865.643097\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=114.32.192.101 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=53 ID=32448 PROTO=TCP SPT=27546 DPT=23 WINDOW=37757 RES=0x00 SYN URGP=0 |
2020-07-04 08:14:11 |
222.186.175.182 | attack | Jul 4 04:34:04 gw1 sshd[21028]: Failed password for root from 222.186.175.182 port 23750 ssh2 Jul 4 04:34:17 gw1 sshd[21028]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 23750 ssh2 [preauth] ... |
2020-07-04 07:36:13 |
114.67.67.148 | attackspam | Jul 4 01:17:56 lnxweb61 sshd[21481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.67.148 |
2020-07-04 07:47:43 |
124.196.11.6 | attack | Jul 4 02:10:34 pkdns2 sshd\[40439\]: Failed password for root from 124.196.11.6 port 42552 ssh2Jul 4 02:13:07 pkdns2 sshd\[40545\]: Invalid user webhost from 124.196.11.6Jul 4 02:13:10 pkdns2 sshd\[40545\]: Failed password for invalid user webhost from 124.196.11.6 port 60798 ssh2Jul 4 02:15:26 pkdns2 sshd\[40678\]: Invalid user danny from 124.196.11.6Jul 4 02:15:28 pkdns2 sshd\[40678\]: Failed password for invalid user danny from 124.196.11.6 port 16465 ssh2Jul 4 02:17:44 pkdns2 sshd\[40768\]: Invalid user bot from 124.196.11.6 ... |
2020-07-04 07:53:37 |
107.175.87.152 | attackspam | Jul 4 01:53:02 debian-2gb-nbg1-2 kernel: \[16079003.142160\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=107.175.87.152 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=54321 PROTO=TCP SPT=35569 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-07-04 08:11:23 |
128.199.253.146 | attackspambots | (sshd) Failed SSH login from 128.199.253.146 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 4 01:09:12 grace sshd[9011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.253.146 user=root Jul 4 01:09:15 grace sshd[9011]: Failed password for root from 128.199.253.146 port 59816 ssh2 Jul 4 01:14:34 grace sshd[9591]: Invalid user catherine from 128.199.253.146 port 57397 Jul 4 01:14:36 grace sshd[9591]: Failed password for invalid user catherine from 128.199.253.146 port 57397 ssh2 Jul 4 01:17:25 grace sshd[10147]: Invalid user irc from 128.199.253.146 port 40063 |
2020-07-04 08:15:47 |
192.144.239.96 | attackbots | Jul 4 00:15:29 gestao sshd[14968]: Failed password for root from 192.144.239.96 port 54784 ssh2 Jul 4 00:17:59 gestao sshd[15027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.239.96 Jul 4 00:18:01 gestao sshd[15027]: Failed password for invalid user testdev from 192.144.239.96 port 38068 ssh2 ... |
2020-07-04 07:39:01 |
60.167.178.50 | attack | " " |
2020-07-04 07:51:15 |
209.97.189.106 | attackbots | no |
2020-07-04 07:48:57 |