City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
93.108.242.140 | attackspam | Oct 11 13:56:20 NPSTNNYC01T sshd[11746]: Failed password for root from 93.108.242.140 port 34022 ssh2 Oct 11 13:59:54 NPSTNNYC01T sshd[12050]: Failed password for root from 93.108.242.140 port 46409 ssh2 ... |
2020-10-12 02:19:22 |
93.108.242.140 | attackspam | DATE:2020-10-11 10:26:32, IP:93.108.242.140, PORT:ssh SSH brute force auth (docker-dc) |
2020-10-11 18:09:30 |
93.108.242.140 | attackspam | (sshd) Failed SSH login from 93.108.242.140 (PT/Portugal/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 10 17:23:04 server2 sshd[6736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root Oct 10 17:23:04 server2 sshd[6736]: Failed password for root from 93.108.242.140 port 45379 ssh2 Oct 10 17:29:59 server2 sshd[8009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root Oct 10 17:30:00 server2 sshd[8009]: Failed password for root from 93.108.242.140 port 23013 ssh2 Oct 10 17:33:36 server2 sshd[8502]: Invalid user apache from 93.108.242.140 port 43069 |
2020-10-11 01:52:26 |
93.108.242.140 | attack | Sep 28 16:55:34 pve1 sshd[19253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 Sep 28 16:55:36 pve1 sshd[19253]: Failed password for invalid user noreply from 93.108.242.140 port 44053 ssh2 ... |
2020-09-29 03:27:29 |
93.108.242.140 | attackspam | SSH brutforce |
2020-09-28 19:38:45 |
93.108.242.140 | attack | reported through recidive - multiple failed attempts(SSH) |
2020-09-23 21:24:09 |
93.108.242.140 | attackspam | Sep 22 18:22:16 vps-51d81928 sshd[296848]: Invalid user sybase from 93.108.242.140 port 45602 Sep 22 18:22:16 vps-51d81928 sshd[296848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 Sep 22 18:22:16 vps-51d81928 sshd[296848]: Invalid user sybase from 93.108.242.140 port 45602 Sep 22 18:22:18 vps-51d81928 sshd[296848]: Failed password for invalid user sybase from 93.108.242.140 port 45602 ssh2 Sep 22 18:26:11 vps-51d81928 sshd[296926]: Invalid user admin from 93.108.242.140 port 33807 ... |
2020-09-23 05:33:48 |
93.108.242.140 | attackspambots | 2020-09-12T09:50:37.301838yoshi.linuxbox.ninja sshd[2172536]: Failed password for root from 93.108.242.140 port 17758 ssh2 2020-09-12T09:52:48.702245yoshi.linuxbox.ninja sshd[2174090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root 2020-09-12T09:52:50.841777yoshi.linuxbox.ninja sshd[2174090]: Failed password for root from 93.108.242.140 port 12694 ssh2 ... |
2020-09-12 23:57:31 |
93.108.242.140 | attack | <6 unauthorized SSH connections |
2020-09-12 15:59:40 |
93.108.242.140 | attackbots | SSH Invalid Login |
2020-09-12 07:46:25 |
93.108.242.140 | attackspambots | Aug 28 00:22:49 abendstille sshd\[13400\]: Invalid user cloud from 93.108.242.140 Aug 28 00:22:49 abendstille sshd\[13400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 Aug 28 00:22:51 abendstille sshd\[13400\]: Failed password for invalid user cloud from 93.108.242.140 port 26168 ssh2 Aug 28 00:26:37 abendstille sshd\[17191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root Aug 28 00:26:39 abendstille sshd\[17191\]: Failed password for root from 93.108.242.140 port 16586 ssh2 ... |
2020-08-28 06:35:44 |
93.108.242.140 | attack | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-21 16:06:32 |
93.108.242.140 | attack | Invalid user zrb from 93.108.242.140 port 21599 |
2020-08-20 18:09:21 |
93.108.242.140 | attackspambots | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-11 00:06:43 |
93.108.242.140 | attackbots | Aug 7 08:11:39 lukav-desktop sshd\[20237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root Aug 7 08:11:41 lukav-desktop sshd\[20237\]: Failed password for root from 93.108.242.140 port 27116 ssh2 Aug 7 08:15:37 lukav-desktop sshd\[10126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root Aug 7 08:15:39 lukav-desktop sshd\[10126\]: Failed password for root from 93.108.242.140 port 48624 ssh2 Aug 7 08:19:33 lukav-desktop sshd\[10169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root |
2020-08-07 15:05:55 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.108.24.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.108.24.114. IN A
;; AUTHORITY SECTION:
. 108 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023032900 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 16:33:12 CST 2023
;; MSG SIZE rcvd: 106
114.24.108.93.in-addr.arpa domain name pointer 114.24.108.93.rev.vodafone.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
114.24.108.93.in-addr.arpa name = 114.24.108.93.rev.vodafone.pt.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
84.38.180.17 | attackbotsspam | Apr 23 05:51:09 pl3server sshd[10153]: Invalid user postgres from 84.38.180.17 port 51864 Apr 23 05:51:09 pl3server sshd[10153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.38.180.17 Apr 23 05:51:11 pl3server sshd[10153]: Failed password for invalid user postgres from 84.38.180.17 port 51864 ssh2 Apr 23 05:51:11 pl3server sshd[10153]: Received disconnect from 84.38.180.17 port 51864:11: Bye Bye [preauth] Apr 23 05:51:11 pl3server sshd[10153]: Disconnected from 84.38.180.17 port 51864 [preauth] Apr 23 06:02:18 pl3server sshd[17323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.38.180.17 user=r.r Apr 23 06:02:20 pl3server sshd[17323]: Failed password for r.r from 84.38.180.17 port 41206 ssh2 Apr 23 06:02:20 pl3server sshd[17323]: Received disconnect from 84.38.180.17 port 41206:11: Bye Bye [preauth] Apr 23 06:02:20 pl3server sshd[17323]: Disconnected from 84.38.180.17 port 41206 ........ ------------------------------- |
2020-04-23 14:19:23 |
80.82.78.104 | attackbotsspam | Unauthorized connection attempt detected from IP address 80.82.78.104 to port 4567 [T] |
2020-04-23 14:10:23 |
117.50.63.227 | attackspambots | " " |
2020-04-23 14:13:49 |
139.199.14.105 | attackspam | Invalid user test1 from 139.199.14.105 port 59484 |
2020-04-23 14:20:10 |
185.58.226.235 | attack | Apr 23 01:32:08 r.ca sshd[15809]: Failed password for invalid user ck from 185.58.226.235 port 39302 ssh2 |
2020-04-23 14:17:52 |
83.97.20.35 | attack | Apr 23 08:07:41 debian-2gb-nbg1-2 kernel: \[9881011.289144\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=83.97.20.35 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=45000 DPT=4848 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-04-23 14:11:52 |
54.39.98.253 | attackspam | fail2ban/Apr 23 05:58:29 h1962932 sshd[6872]: Invalid user ubuntu from 54.39.98.253 port 54314 Apr 23 05:58:29 h1962932 sshd[6872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=253.ip-54-39-98.net Apr 23 05:58:29 h1962932 sshd[6872]: Invalid user ubuntu from 54.39.98.253 port 54314 Apr 23 05:58:31 h1962932 sshd[6872]: Failed password for invalid user ubuntu from 54.39.98.253 port 54314 ssh2 Apr 23 06:06:57 h1962932 sshd[7424]: Invalid user admin from 54.39.98.253 port 40920 |
2020-04-23 14:34:20 |
13.90.47.174 | attackspam | Apr 23 07:36:18 h2779839 sshd[17139]: Invalid user ki from 13.90.47.174 port 50620 Apr 23 07:36:18 h2779839 sshd[17139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.90.47.174 Apr 23 07:36:18 h2779839 sshd[17139]: Invalid user ki from 13.90.47.174 port 50620 Apr 23 07:36:20 h2779839 sshd[17139]: Failed password for invalid user ki from 13.90.47.174 port 50620 ssh2 Apr 23 07:40:38 h2779839 sshd[17225]: Invalid user tx from 13.90.47.174 port 46074 Apr 23 07:40:38 h2779839 sshd[17225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.90.47.174 Apr 23 07:40:38 h2779839 sshd[17225]: Invalid user tx from 13.90.47.174 port 46074 Apr 23 07:40:40 h2779839 sshd[17225]: Failed password for invalid user tx from 13.90.47.174 port 46074 ssh2 Apr 23 07:44:54 h2779839 sshd[17285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.90.47.174 user=root Apr 23 07:44:56 h2779839 ... |
2020-04-23 14:11:04 |
49.232.173.147 | attackspambots | SSH bruteforce |
2020-04-23 14:17:06 |
14.241.239.105 | attackspambots | Apr 23 00:53:18 ws19vmsma01 sshd[63841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.241.239.105 Apr 23 00:53:20 ws19vmsma01 sshd[63841]: Failed password for invalid user admin from 14.241.239.105 port 60264 ssh2 ... |
2020-04-23 14:33:29 |
60.250.147.218 | attack | 2020-04-23T05:53:57.910976rocketchat.forhosting.nl sshd[20841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.147.218 2020-04-23T05:53:57.907937rocketchat.forhosting.nl sshd[20841]: Invalid user su from 60.250.147.218 port 50436 2020-04-23T05:54:00.241138rocketchat.forhosting.nl sshd[20841]: Failed password for invalid user su from 60.250.147.218 port 50436 ssh2 ... |
2020-04-23 14:03:53 |
200.105.183.118 | attackspam | SSH brute force attempt |
2020-04-23 14:29:23 |
151.80.173.36 | attack | Apr 23 06:59:04 server sshd[23990]: Failed password for root from 151.80.173.36 port 59044 ssh2 Apr 23 07:03:18 server sshd[25004]: Failed password for root from 151.80.173.36 port 37976 ssh2 Apr 23 07:07:28 server sshd[25259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.173.36 ... |
2020-04-23 14:10:00 |
14.29.165.173 | attackbots | SSH Brute-Force reported by Fail2Ban |
2020-04-23 14:13:18 |
128.199.174.201 | attack | 5x Failed Password |
2020-04-23 14:39:05 |