City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 42.156.139.7 | attackspambots | Automated report (2020-08-24T11:55:46+08:00). Misbehaving bot detected at this address. |
2020-08-24 13:08:11 |
| 42.156.139.151 | attackspambots | ICMP MH Probe, Scan /Distributed - |
2020-02-13 22:26:41 |
| 42.156.139.60 | attackspambots | The IP has triggered Cloudflare WAF. CF-Ray: 5410f168bac7ebd9 | WAF_Rule_ID: f6705d4933894b0583ba1042603083f6 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: theme-suka.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-08 06:59:11 |
| 42.156.139.16 | attackspam | The IP has triggered Cloudflare WAF. CF-Ray: 5413b9b13abceef2 | WAF_Rule_ID: f6705d4933894b0583ba1042603083f6 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-08 04:20:39 |
| 42.156.139.46 | attackspambots | The IP has triggered Cloudflare WAF. CF-Ray: 5415cf340f7d7704 | WAF_Rule_ID: f6705d4933894b0583ba1042603083f6 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-08 02:08:22 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.156.139.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.156.139.5. IN A
;; AUTHORITY SECTION:
. 526 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400
;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 02:38:26 CST 2022
;; MSG SIZE rcvd: 105
5.139.156.42.in-addr.arpa domain name pointer shenmaspider-42-156-139-5.crawl.sm.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
5.139.156.42.in-addr.arpa name = shenmaspider-42-156-139-5.crawl.sm.cn.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 166.70.106.112 | attack | Honeypot attack, port: 445, PTR: 166-70-106-112.xmission.com. |
2020-04-13 22:55:15 |
| 119.197.203.125 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-04-13 22:44:37 |
| 185.142.236.35 | attackbots | Report Port Scan: Events[2] countPorts[2]: 2121 4567 .. |
2020-04-13 22:52:01 |
| 35.188.254.84 | attack | 8873/tcp 21/tcp... [2020-03-08/04-12]7pkt,3pt.(tcp) |
2020-04-13 23:19:31 |
| 180.76.152.157 | attackbots | 3x Failed Password |
2020-04-13 23:18:13 |
| 194.26.29.106 | attackspam | 18797/tcp 18691/tcp 18802/tcp... [2020-03-25/04-12]705pkt,481pt.(tcp) |
2020-04-13 23:06:16 |
| 223.247.219.165 | attack | k+ssh-bruteforce |
2020-04-13 23:24:53 |
| 164.132.145.70 | attackspam | Apr 13 16:16:56 server sshd[13805]: Failed password for root from 164.132.145.70 port 59560 ssh2 Apr 13 16:20:50 server sshd[14560]: Failed password for root from 164.132.145.70 port 41118 ssh2 Apr 13 16:24:54 server sshd[15459]: Failed password for invalid user asterisk from 164.132.145.70 port 50902 ssh2 |
2020-04-13 23:24:10 |
| 51.91.103.33 | attackspam | $f2bV_matches |
2020-04-13 22:54:02 |
| 183.89.171.243 | attack | 1586767262 - 04/13/2020 10:41:02 Host: 183.89.171.243/183.89.171.243 Port: 445 TCP Blocked |
2020-04-13 23:02:21 |
| 95.213.244.42 | attack | [portscan] Port scan |
2020-04-13 23:19:18 |
| 186.215.235.9 | attackspambots | prod11 ... |
2020-04-13 23:01:45 |
| 122.51.21.208 | attackspambots | 2020-04-13T03:41:43.121491linuxbox-skyline sshd[87014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.21.208 user=root 2020-04-13T03:41:45.505593linuxbox-skyline sshd[87014]: Failed password for root from 122.51.21.208 port 56096 ssh2 ... |
2020-04-13 23:23:23 |
| 185.142.236.34 | attackbotsspam | Unauthorized connection attempt detected from IP address 185.142.236.34 to port 9100 |
2020-04-13 22:52:16 |
| 222.186.175.216 | attack | Apr 13 15:56:55 combo sshd[6779]: Failed password for root from 222.186.175.216 port 31700 ssh2 Apr 13 15:56:58 combo sshd[6779]: Failed password for root from 222.186.175.216 port 31700 ssh2 Apr 13 15:57:01 combo sshd[6779]: Failed password for root from 222.186.175.216 port 31700 ssh2 ... |
2020-04-13 23:21:52 |