City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 42.2.93.9 | attack | Unauthorized connection attempt detected from IP address 42.2.93.9 to port 5555 [T] |
2020-08-29 20:45:13 |
| 42.2.93.42 | attack | Honeypot attack, port: 5555, PTR: 42-2-93-042.static.netvigator.com. |
2020-02-14 23:13:01 |
| 42.2.90.73 | attackspambots | Port Scan: TCP/5555 |
2019-09-03 01:48:33 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.9.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8212
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.2.9.50. IN A
;; AUTHORITY SECTION:
. 349 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:19:40 CST 2022
;; MSG SIZE rcvd: 102
50.9.2.42.in-addr.arpa domain name pointer 42-2-9-050.static.netvigator.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
50.9.2.42.in-addr.arpa name = 42-2-9-050.static.netvigator.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.243.128.92 | attackspam | " " |
2020-04-06 03:54:18 |
| 192.241.238.106 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-04-06 03:58:04 |
| 162.243.131.230 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-04-06 04:04:51 |
| 182.50.132.110 | attackbotsspam | xmlrpc attack |
2020-04-06 03:44:47 |
| 106.12.210.127 | attackbots | 5x Failed Password |
2020-04-06 03:41:06 |
| 109.116.196.174 | attack | $f2bV_matches |
2020-04-06 04:06:44 |
| 5.135.152.97 | attackbots | leo_www |
2020-04-06 03:32:17 |
| 109.116.41.170 | attack | (sshd) Failed SSH login from 109.116.41.170 (IT/Italy/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 5 19:53:09 amsweb01 sshd[10863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.41.170 user=root Apr 5 19:53:11 amsweb01 sshd[10863]: Failed password for root from 109.116.41.170 port 40792 ssh2 Apr 5 20:03:50 amsweb01 sshd[12566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.41.170 user=root Apr 5 20:03:52 amsweb01 sshd[12566]: Failed password for root from 109.116.41.170 port 38440 ssh2 Apr 5 20:09:39 amsweb01 sshd[13651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.41.170 user=root |
2020-04-06 03:52:00 |
| 166.111.152.230 | attackbotsspam | Apr 5 15:39:08 ws12vmsma01 sshd[3818]: Failed password for root from 166.111.152.230 port 55952 ssh2 Apr 5 15:41:21 ws12vmsma01 sshd[4140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.152.230 user=root Apr 5 15:41:23 ws12vmsma01 sshd[4140]: Failed password for root from 166.111.152.230 port 57488 ssh2 ... |
2020-04-06 03:27:31 |
| 184.105.139.113 | attackbotsspam | 4786/tcp 7547/tcp 3389/tcp... [2020-02-13/04-05]29pkt,11pt.(tcp),3pt.(udp) |
2020-04-06 04:02:00 |
| 187.136.102.34 | attackspambots | WordPress wp-login brute force :: 187.136.102.34 0.072 BYPASS [05/Apr/2020:12:38:49 0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2287 "https://[censored_2]/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36" |
2020-04-06 03:45:49 |
| 78.128.113.73 | attackbots | Apr 5 21:06:33 mail.srvfarm.net postfix/smtps/smtpd[4091370]: warning: unknown[78.128.113.73]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 5 21:06:33 mail.srvfarm.net postfix/smtps/smtpd[4091370]: lost connection after AUTH from unknown[78.128.113.73] Apr 5 21:06:38 mail.srvfarm.net postfix/smtps/smtpd[4090111]: warning: unknown[78.128.113.73]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 5 21:06:38 mail.srvfarm.net postfix/smtps/smtpd[4090111]: lost connection after AUTH from unknown[78.128.113.73] Apr 5 21:06:39 mail.srvfarm.net postfix/smtps/smtpd[4089118]: lost connection after AUTH from unknown[78.128.113.73] |
2020-04-06 03:40:23 |
| 145.239.198.218 | attackspambots | Apr 5 15:13:44 NPSTNNYC01T sshd[4236]: Failed password for root from 145.239.198.218 port 51158 ssh2 Apr 5 15:17:20 NPSTNNYC01T sshd[4420]: Failed password for root from 145.239.198.218 port 45680 ssh2 ... |
2020-04-06 03:57:38 |
| 222.186.190.2 | attackbots | Apr 5 21:24:58 mail sshd\[5092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Apr 5 21:25:00 mail sshd\[5092\]: Failed password for root from 222.186.190.2 port 42012 ssh2 Apr 5 21:25:04 mail sshd\[5092\]: Failed password for root from 222.186.190.2 port 42012 ssh2 ... |
2020-04-06 03:31:55 |
| 93.171.5.244 | attack | 2020-04-05T21:45:18.450278vps773228.ovh.net sshd[28651]: Failed password for root from 93.171.5.244 port 55855 ssh2 2020-04-05T21:48:50.579706vps773228.ovh.net sshd[29985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.171.5.244 user=root 2020-04-05T21:48:52.366378vps773228.ovh.net sshd[29985]: Failed password for root from 93.171.5.244 port 60562 ssh2 2020-04-05T21:52:24.303699vps773228.ovh.net sshd[31400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.171.5.244 user=root 2020-04-05T21:52:26.135458vps773228.ovh.net sshd[31400]: Failed password for root from 93.171.5.244 port 37033 ssh2 ... |
2020-04-06 04:07:03 |