City: unknown
Region: unknown
Country: China
Internet Service Provider: Henan Telcom Union Technology Co. Ltd
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attack | Failed password for invalid user web from 42.51.13.2 port 46784 ssh2 |
2020-06-24 13:51:36 |
IP | Type | Details | Datetime |
---|---|---|---|
42.51.136.12 | attackspam | Unauthorized connection attempt detected from IP address 42.51.136.12 to port 1433 [T] |
2020-04-15 02:20:55 |
42.51.133.29 | attack | Dec 23 03:07:30 webhost01 sshd[21719]: Failed password for root from 42.51.133.29 port 38920 ssh2 ... |
2019-12-23 04:14:34 |
42.51.133.29 | attack | Dec 10 04:06:59 mailserver sshd[6868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.133.29 user=r.r Dec 10 04:07:01 mailserver sshd[6868]: Failed password for r.r from 42.51.133.29 port 35671 ssh2 Dec 10 04:07:01 mailserver sshd[6868]: Received disconnect from 42.51.133.29 port 35671:11: Bye Bye [preauth] Dec 10 04:07:01 mailserver sshd[6868]: Disconnected from 42.51.133.29 port 35671 [preauth] Dec 10 04:29:59 mailserver sshd[8981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.133.29 user=r.r Dec 10 04:30:01 mailserver sshd[8981]: Failed password for r.r from 42.51.133.29 port 44008 ssh2 Dec 10 04:30:01 mailserver sshd[8981]: Received disconnect from 42.51.133.29 port 44008:11: Bye Bye [preauth] Dec 10 04:30:01 mailserver sshd[8981]: Disconnected from 42.51.133.29 port 44008 [preauth] Dec 10 04:35:55 mailserver sshd[9430]: Invalid user brace from 42.51.133.29 Dec 10 04:35........ ------------------------------- |
2019-12-10 16:00:12 |
42.51.13.102 | attackbots | Invalid user an from 42.51.13.102 port 53275 |
2019-10-23 07:54:04 |
42.51.13.107 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-20 00:11:42 |
42.51.13.107 | attackbots | 2019-10-18T19:56:03.124936abusebot-6.cloudsearch.cf sshd\[2860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.13.107 user=root |
2019-10-19 04:44:39 |
42.51.13.102 | attackspambots | $f2bV_matches |
2019-10-16 14:23:15 |
42.51.13.102 | attack | Oct 10 10:50:01 myhostname sshd[20963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.13.102 user=r.r Oct 10 10:50:03 myhostname sshd[20963]: Failed password for r.r from 42.51.13.102 port 57284 ssh2 Oct 10 10:50:03 myhostname sshd[20963]: Received disconnect from 42.51.13.102 port 57284:11: Bye Bye [preauth] Oct 10 10:50:03 myhostname sshd[20963]: Disconnected from 42.51.13.102 port 57284 [preauth] Oct 10 11:14:57 myhostname sshd[21029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.13.102 user=r.r Oct 10 11:14:59 myhostname sshd[21029]: Failed password for r.r from 42.51.13.102 port 43249 ssh2 Oct 10 11:14:59 myhostname sshd[21029]: Received disconnect from 42.51.13.102 port 43249:11: Bye Bye [preauth] Oct 10 11:14:59 myhostname sshd[21029]: Disconnected from 42.51.13.102 port 43249 [preauth] Oct 10 11:19:42 myhostname sshd[21038]: pam_unix(sshd:auth): authentication fail........ ------------------------------- |
2019-10-13 16:57:43 |
42.51.13.102 | attackbots | Oct 10 10:50:01 myhostname sshd[20963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.13.102 user=r.r Oct 10 10:50:03 myhostname sshd[20963]: Failed password for r.r from 42.51.13.102 port 57284 ssh2 Oct 10 10:50:03 myhostname sshd[20963]: Received disconnect from 42.51.13.102 port 57284:11: Bye Bye [preauth] Oct 10 10:50:03 myhostname sshd[20963]: Disconnected from 42.51.13.102 port 57284 [preauth] Oct 10 11:14:57 myhostname sshd[21029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.13.102 user=r.r Oct 10 11:14:59 myhostname sshd[21029]: Failed password for r.r from 42.51.13.102 port 43249 ssh2 Oct 10 11:14:59 myhostname sshd[21029]: Received disconnect from 42.51.13.102 port 43249:11: Bye Bye [preauth] Oct 10 11:14:59 myhostname sshd[21029]: Disconnected from 42.51.13.102 port 43249 [preauth] Oct 10 11:19:42 myhostname sshd[21038]: pam_unix(sshd:auth): authentication fail........ ------------------------------- |
2019-10-11 06:48:52 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.51.13.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45245
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.51.13.2. IN A
;; AUTHORITY SECTION:
. 250 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020062400 1800 900 604800 86400
;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 24 13:51:32 CST 2020
;; MSG SIZE rcvd: 114
2.13.51.42.in-addr.arpa domain name pointer idc.ly.ha.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.13.51.42.in-addr.arpa name = idc.ly.ha.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
87.251.74.170 | attack | May 10 01:56:18 debian-2gb-nbg1-2 kernel: \[11327452.676140\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.170 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=5607 PROTO=TCP SPT=47584 DPT=11885 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-10 08:32:12 |
221.228.97.218 | attackspam | [MK-Root1] Blocked by UFW |
2020-05-10 12:14:20 |
104.248.56.150 | attackbots | May 10 05:56:52 host sshd[6374]: Invalid user test123 from 104.248.56.150 port 33222 ... |
2020-05-10 12:19:29 |
62.173.147.209 | attackspambots | VoIP Brute Force - 62.173.147.209 - Auto Report ... |
2020-05-10 08:30:14 |
34.96.235.78 | attack | May 7 02:53:08 reporting sshd[29887]: Invalid user chenj from 34.96.235.78 May 7 02:53:08 reporting sshd[29887]: Failed password for invalid user chenj from 34.96.235.78 port 59008 ssh2 May 7 03:03:58 reporting sshd[4987]: Invalid user arul from 34.96.235.78 May 7 03:03:58 reporting sshd[4987]: Failed password for invalid user arul from 34.96.235.78 port 34408 ssh2 May 7 03:12:54 reporting sshd[11610]: Invalid user test2 from 34.96.235.78 May 7 03:12:54 reporting sshd[11610]: Failed password for invalid user test2 from 34.96.235.78 port 44610 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=34.96.235.78 |
2020-05-10 08:28:37 |
45.148.10.182 | attack | May 10 06:56:49 www2 sshd\[17905\]: Failed password for root from 45.148.10.182 port 33082 ssh2May 10 06:56:53 www2 sshd\[17918\]: Failed password for root from 45.148.10.182 port 37222 ssh2May 10 06:56:55 www2 sshd\[17941\]: Invalid user admin from 45.148.10.182 ... |
2020-05-10 12:13:57 |
217.13.222.170 | attack | 20/5/9@16:26:43: FAIL: Alarm-Intrusion address from=217.13.222.170 ... |
2020-05-10 08:26:39 |
139.199.18.194 | attack | May 10 05:55:47 ns382633 sshd\[31418\]: Invalid user postgres from 139.199.18.194 port 54310 May 10 05:55:47 ns382633 sshd\[31418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.18.194 May 10 05:55:49 ns382633 sshd\[31418\]: Failed password for invalid user postgres from 139.199.18.194 port 54310 ssh2 May 10 05:56:43 ns382633 sshd\[31477\]: Invalid user zhuang from 139.199.18.194 port 35854 May 10 05:56:43 ns382633 sshd\[31477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.18.194 |
2020-05-10 12:25:31 |
51.68.198.113 | attack | May 10 05:56:49 ns381471 sshd[29769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.113 May 10 05:56:51 ns381471 sshd[29769]: Failed password for invalid user es from 51.68.198.113 port 36410 ssh2 |
2020-05-10 12:22:19 |
113.88.167.227 | attackbotsspam | Unauthorized connection attempt from IP address 113.88.167.227 on Port 445(SMB) |
2020-05-10 12:23:37 |
222.186.42.137 | attackspambots | 05/09/2020-23:57:06.710216 222.186.42.137 Protocol: 6 ET SCAN Potential SSH Scan |
2020-05-10 12:01:21 |
66.70.228.168 | attackspambots | handyreparatur-fulda.de:80 66.70.228.168 - - [10/May/2020:05:56:45 +0200] "POST /xmlrpc.php HTTP/1.0" 301 521 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0 Safari/605.1.15" www.handydirektreparatur.de 66.70.228.168 [10/May/2020:05:56:47 +0200] "POST /xmlrpc.php HTTP/1.0" 200 3595 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0 Safari/605.1.15" |
2020-05-10 12:22:45 |
152.32.64.106 | attackspambots | (sshd) Failed SSH login from 152.32.64.106 (PH/Philippines/106.64.32.152.-rev.convergeict.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 10 05:43:48 elude sshd[23300]: Invalid user mcserv from 152.32.64.106 port 53335 May 10 05:43:49 elude sshd[23300]: Failed password for invalid user mcserv from 152.32.64.106 port 53335 ssh2 May 10 05:52:38 elude sshd[24569]: Invalid user admin from 152.32.64.106 port 55319 May 10 05:52:40 elude sshd[24569]: Failed password for invalid user admin from 152.32.64.106 port 55319 ssh2 May 10 05:56:52 elude sshd[25185]: Invalid user thompson from 152.32.64.106 port 59469 |
2020-05-10 12:16:24 |
222.186.175.167 | attack | May 10 06:00:54 MainVPS sshd[7851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root May 10 06:00:56 MainVPS sshd[7851]: Failed password for root from 222.186.175.167 port 26110 ssh2 May 10 06:01:00 MainVPS sshd[7851]: Failed password for root from 222.186.175.167 port 26110 ssh2 May 10 06:00:54 MainVPS sshd[7851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root May 10 06:00:56 MainVPS sshd[7851]: Failed password for root from 222.186.175.167 port 26110 ssh2 May 10 06:01:00 MainVPS sshd[7851]: Failed password for root from 222.186.175.167 port 26110 ssh2 May 10 06:00:54 MainVPS sshd[7851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167 user=root May 10 06:00:56 MainVPS sshd[7851]: Failed password for root from 222.186.175.167 port 26110 ssh2 May 10 06:01:00 MainVPS sshd[7851]: Failed password for root from 222.186.175.167 |
2020-05-10 12:02:29 |
45.138.98.121 | attack | email spam |
2020-05-10 12:01:51 |