City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 42.2.48.166 | attackbots | Port probing on unauthorized port 5555 |
2020-04-20 00:17:13 |
| 42.2.48.166 | attackspambots | Honeypot attack, port: 5555, PTR: 42-2-48-166.static.netvigator.com. |
2020-04-13 16:56:25 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.48.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.2.48.114. IN A
;; AUTHORITY SECTION:
. 457 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 20:09:39 CST 2022
;; MSG SIZE rcvd: 104
114.48.2.42.in-addr.arpa domain name pointer 42-2-48-114.static.netvigator.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
114.48.2.42.in-addr.arpa name = 42-2-48-114.static.netvigator.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.247.39.62 | attack | 2019-07-07T12:09:19.979Z CLOSE host=112.247.39.62 port=39510 fd=4 time=4283.341 bytes=7330 ... |
2019-09-11 04:25:58 |
| 183.220.53.39 | attackbotsspam | Aug 1 01:54:06 mercury auth[20366]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=info@lukegirvin.co.uk rhost=183.220.53.39 ... |
2019-09-11 04:32:14 |
| 146.88.240.2 | attack | Apr 29 19:17:59 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:0d:8f:41:08:00 SRC=146.88.240.2 DST=109.74.200.221 LEN=76 TOS=0x00 PREC=0x00 TTL=246 ID=54321 PROTO=UDP SPT=45238 DPT=123 LEN=56 ... |
2019-09-11 04:12:19 |
| 122.194.34.163 | attackspam | Sep 10 12:50:40 xxxxxxx0 sshd[11402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.34.163 user=r.r Sep 10 12:50:42 xxxxxxx0 sshd[11402]: Failed password for r.r from 122.194.34.163 port 60059 ssh2 Sep 10 12:50:45 xxxxxxx0 sshd[11402]: Failed password for r.r from 122.194.34.163 port 60059 ssh2 Sep 10 12:50:47 xxxxxxx0 sshd[11402]: Failed password for r.r from 122.194.34.163 port 60059 ssh2 Sep 10 12:50:50 xxxxxxx0 sshd[11402]: Failed password for r.r from 122.194.34.163 port 60059 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=122.194.34.163 |
2019-09-11 04:01:26 |
| 113.193.231.2 | attackspambots | Unauthorized connection attempt from IP address 113.193.231.2 on Port 445(SMB) |
2019-09-11 04:12:53 |
| 112.85.213.4 | attackbotsspam | 2019-08-26T12:07:51.414Z CLOSE host=112.85.213.4 port=51244 fd=5 time=1110.471 bytes=2098 ... |
2019-09-11 03:57:54 |
| 96.75.52.245 | attackbotsspam | Sep 10 07:37:04 xtremcommunity sshd\[180569\]: Invalid user superuser from 96.75.52.245 port 57142 Sep 10 07:37:04 xtremcommunity sshd\[180569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.75.52.245 Sep 10 07:37:06 xtremcommunity sshd\[180569\]: Failed password for invalid user superuser from 96.75.52.245 port 57142 ssh2 Sep 10 07:43:04 xtremcommunity sshd\[180796\]: Invalid user 1q2w3e4r from 96.75.52.245 port 25559 Sep 10 07:43:04 xtremcommunity sshd\[180796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.75.52.245 ... |
2019-09-11 04:26:51 |
| 146.88.240.18 | attack | Aug 6 03:58:23 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:5a:1a:41:08:00 SRC=146.88.240.18 DST=109.74.200.221 LEN=76 TOS=0x00 PREC=0x00 TTL=55 ID=44222 DF PROTO=UDP SPT=37362 DPT=123 LEN=56 ... |
2019-09-11 04:32:44 |
| 60.250.30.101 | attack | Unauthorized connection attempt from IP address 60.250.30.101 on Port 445(SMB) |
2019-09-11 03:58:34 |
| 168.232.130.53 | attackbotsspam | Lines containing failures of 168.232.130.53 Sep 10 10:51:13 vps9 sshd[8210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.130.53 user=r.r Sep 10 10:51:14 vps9 sshd[8210]: Failed password for r.r from 168.232.130.53 port 50596 ssh2 Sep 10 10:51:17 vps9 sshd[8210]: Failed password for r.r from 168.232.130.53 port 50596 ssh2 Sep 10 10:51:19 vps9 sshd[8210]: Failed password for r.r from 168.232.130.53 port 50596 ssh2 Sep 10 10:51:23 vps9 sshd[8210]: message repeated 2 serveres: [ Failed password for r.r from 168.232.130.53 port 50596 ssh2] Sep 10 10:51:25 vps9 sshd[8210]: Failed password for r.r from 168.232.130.53 port 50596 ssh2 Sep 10 10:51:25 vps9 sshd[8210]: error: maximum authentication attempts exceeded for r.r from 168.232.130.53 port 50596 ssh2 [preauth] Sep 10 10:51:25 vps9 sshd[8210]: Disconnecting authenticating user r.r 168.232.130.53 port 50596: Too many authentication failures [preauth] Sep 10 10:51:25 vps9 s........ ------------------------------ |
2019-09-11 04:15:35 |
| 92.91.60.249 | attackspam | Sep 10 21:50:12 vps01 sshd[14494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.91.60.249 Sep 10 21:50:13 vps01 sshd[14494]: Failed password for invalid user 123 from 92.91.60.249 port 52703 ssh2 |
2019-09-11 03:54:11 |
| 122.52.73.159 | attackspam | Unauthorized connection attempt from IP address 122.52.73.159 on Port 445(SMB) |
2019-09-11 04:11:44 |
| 119.79.234.12 | attackbotsspam | [Sun Aug 25 18:19:41.558327 2019] [access_compat:error] [pid 23666] [client 119.79.234.12:42211] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php ... |
2019-09-11 04:23:59 |
| 109.167.98.27 | attackbots | Sep 10 09:30:23 hanapaa sshd\[5427\]: Invalid user christian from 109.167.98.27 Sep 10 09:30:23 hanapaa sshd\[5427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.98.27 Sep 10 09:30:25 hanapaa sshd\[5427\]: Failed password for invalid user christian from 109.167.98.27 port 59990 ssh2 Sep 10 09:36:45 hanapaa sshd\[5983\]: Invalid user demo@123 from 109.167.98.27 Sep 10 09:36:45 hanapaa sshd\[5983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.98.27 |
2019-09-11 03:53:51 |
| 183.82.255.181 | attackspambots | Jul 9 16:57:27 mercury auth[19465]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=183.82.255.181 ... |
2019-09-11 04:15:06 |