City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: Hong Kong Telecommunications (HKT) Limited
Hostname: unknown
Organization: unknown
Usage Type: unknown
| Type | Details | Datetime |
|---|---|---|
| attack | SSH login attempts. |
2020-08-23 00:03:51 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 42.2.195.132 | attack | 5555/tcp [2020-10-05]1pkt |
2020-10-07 02:52:50 |
| 42.2.195.132 | attackspam | 5555/tcp [2020-10-05]1pkt |
2020-10-06 18:52:33 |
| 42.2.199.137 | attackspam | Honeypot attack, port: 5555, PTR: 42-2-199-137.static.netvigator.com. |
2020-06-11 00:13:34 |
| 42.2.198.23 | attackspam | 5555/tcp [2020-04-01]1pkt |
2020-04-01 21:55:12 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.19.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.2.19.26. IN A
;; AUTHORITY SECTION:
. 247 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020082200 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 23 00:03:44 CST 2020
;; MSG SIZE rcvd: 114
26.19.2.42.in-addr.arpa domain name pointer 42-2-19-026.static.netvigator.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
26.19.2.42.in-addr.arpa name = 42-2-19-026.static.netvigator.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.209.0.18 | attack | Nov 12 17:08:49 h2177944 kernel: \[6450467.777030\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34557 PROTO=TCP SPT=56942 DPT=4318 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 12 17:09:43 h2177944 kernel: \[6450522.237824\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=6224 PROTO=TCP SPT=56942 DPT=4329 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 12 17:14:06 h2177944 kernel: \[6450784.504438\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34008 PROTO=TCP SPT=56942 DPT=4335 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 12 17:32:05 h2177944 kernel: \[6451863.096439\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=45321 PROTO=TCP SPT=56942 DPT=4379 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 12 17:42:18 h2177944 kernel: \[6452476.894915\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.18 DST=85.214.117.9 LEN=4 |
2019-11-13 00:45:07 |
| 132.232.33.161 | attack | Nov 12 16:45:09 legacy sshd[21163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.33.161 Nov 12 16:45:10 legacy sshd[21163]: Failed password for invalid user liason from 132.232.33.161 port 36232 ssh2 Nov 12 16:51:13 legacy sshd[21292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.33.161 ... |
2019-11-13 00:28:14 |
| 51.15.190.180 | attackbotsspam | Tried sshing with brute force. |
2019-11-13 00:17:36 |
| 91.207.40.44 | attackspam | Nov 12 16:47:53 vps691689 sshd[2166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.44 Nov 12 16:47:55 vps691689 sshd[2166]: Failed password for invalid user janbjarne from 91.207.40.44 port 54716 ssh2 ... |
2019-11-13 00:21:30 |
| 222.186.175.220 | attackbotsspam | Nov 12 17:24:33 mail sshd[23211]: Failed password for root from 222.186.175.220 port 29708 ssh2 Nov 12 17:24:39 mail sshd[23211]: Failed password for root from 222.186.175.220 port 29708 ssh2 Nov 12 17:24:45 mail sshd[23211]: Failed password for root from 222.186.175.220 port 29708 ssh2 Nov 12 17:24:51 mail sshd[23211]: Failed password for root from 222.186.175.220 port 29708 ssh2 |
2019-11-13 00:30:41 |
| 37.49.231.158 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-13 00:28:00 |
| 200.31.253.65 | attackbots | Honeypot attack, port: 23, PTR: pppoe-65.253.31.200.in-addr.arpa. |
2019-11-13 00:46:02 |
| 37.49.231.130 | attackspambots | 11/12/2019-10:46:37.212983 37.49.231.130 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 33 |
2019-11-13 00:50:45 |
| 125.64.94.221 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-13 00:16:35 |
| 106.105.105.42 | attack | Honeypot attack, port: 445, PTR: 106.105.105.42.adsl.dynamic.seed.net.tw. |
2019-11-13 00:49:58 |
| 59.25.197.158 | attack | 2019-11-12T16:23:50.059396stark.klein-stark.info sshd\[21089\]: Invalid user w from 59.25.197.158 port 56142 2019-11-12T16:23:50.127069stark.klein-stark.info sshd\[21089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.158 2019-11-12T16:23:51.915647stark.klein-stark.info sshd\[21089\]: Failed password for invalid user w from 59.25.197.158 port 56142 ssh2 ... |
2019-11-13 00:24:40 |
| 68.196.16.160 | attackbots | RDP Bruteforce |
2019-11-13 00:11:55 |
| 103.52.52.23 | attackbots | 2019-11-12T16:28:50.405284abusebot-5.cloudsearch.cf sshd\[16200\]: Invalid user alice from 103.52.52.23 port 46362 |
2019-11-13 00:38:48 |
| 40.65.184.154 | attack | st-nyc1-01 recorded 3 login violations from 40.65.184.154 and was blocked at 2019-11-12 16:30:48. 40.65.184.154 has been blocked on 9 previous occasions. 40.65.184.154's first attempt was recorded at 2019-11-12 14:08:58 |
2019-11-13 00:31:50 |
| 182.61.54.213 | attack | Nov 12 15:50:16 localhost sshd\[13291\]: Invalid user 12 from 182.61.54.213 Nov 12 15:50:16 localhost sshd\[13291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.54.213 Nov 12 15:50:18 localhost sshd\[13291\]: Failed password for invalid user 12 from 182.61.54.213 port 43702 ssh2 Nov 12 15:55:28 localhost sshd\[13583\]: Invalid user \&\&\&\&\& from 182.61.54.213 Nov 12 15:55:28 localhost sshd\[13583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.54.213 ... |
2019-11-13 00:30:58 |