City: unknown
Region: unknown
Country: Russian Federation
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.29.124.45 | spambotsattack | This server has bad connection, some apps don't even work. |
2021-03-01 14:14:02 |
| 94.29.124.106 | attackspambots | Unauthorized connection attempt from IP address 94.29.124.106 on Port 445(SMB) |
2019-11-01 00:55:10 |
| 94.29.124.106 | attackbots | Unauthorised access (Oct 10) SRC=94.29.124.106 LEN=52 TTL=113 ID=18762 DF TCP DPT=445 WINDOW=8192 SYN |
2019-10-11 02:53:13 |
| 94.29.124.85 | attack | Unauthorized connection attempt from IP address 94.29.124.85 on Port 445(SMB) |
2019-09-24 03:47:59 |
| 94.29.124.55 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 10:57:44. |
2019-09-19 18:50:59 |
| 94.29.124.46 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 21:12:56,007 INFO [amun_request_handler] PortScan Detected on Port: 445 (94.29.124.46) |
2019-09-17 10:43:26 |
| 94.29.124.80 | attackbotsspam | Unauthorized connection attempt from IP address 94.29.124.80 on Port 445(SMB) |
2019-09-11 03:35:35 |
| 94.29.124.233 | attackspambots | Unauthorized connection attempt from IP address 94.29.124.233 on Port 445(SMB) |
2019-09-05 16:41:37 |
| 94.29.124.190 | attackspam | Unauthorized connection attempt from IP address 94.29.124.190 on Port 445(SMB) |
2019-08-14 14:51:37 |
| 94.29.124.138 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:38:13,986 INFO [amun_request_handler] PortScan Detected on Port: 445 (94.29.124.138) |
2019-08-09 09:43:39 |
| 94.29.124.45 | attack | Unauthorized connection attempt from IP address 94.29.124.45 on Port 445(SMB) |
2019-07-31 21:31:45 |
| 94.29.124.233 | attack | Unauthorized connection attempt from IP address 94.29.124.233 on Port 445(SMB) |
2019-07-31 19:29:12 |
| 94.29.124.55 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 06:10:11,551 INFO [amun_request_handler] PortScan Detected on Port: 445 (94.29.124.55) |
2019-07-17 19:25:55 |
| 94.29.124.89 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 01:25:07,917 INFO [shellcode_manager] (94.29.124.89) no match, writing hexdump (ddf46e155a23b6dc841fa1cd1322d98a :2262228) - MS17010 (EternalBlue) |
2019-06-27 03:02:33 |
| 94.29.124.190 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-06/06-26]4pkt,1pt.(tcp) |
2019-06-27 01:00:48 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.29.124.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.29.124.201. IN A
;; AUTHORITY SECTION:
. 245 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 156 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 09:31:56 CST 2022
;; MSG SIZE rcvd: 106
Host 201.124.29.94.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 201.124.29.94.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.29.105.125 | attack | 2019-11-15T03:26:15.0300961495-001 sshd\[838\]: Invalid user godfree from 195.29.105.125 port 43722 2019-11-15T03:26:15.0371071495-001 sshd\[838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.105.125 2019-11-15T03:26:16.8562771495-001 sshd\[838\]: Failed password for invalid user godfree from 195.29.105.125 port 43722 ssh2 2019-11-15T15:20:03.7300271495-001 sshd\[26821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.105.125 user=sshd 2019-11-15T15:20:05.0881431495-001 sshd\[26821\]: Failed password for sshd from 195.29.105.125 port 59344 ssh2 2019-11-15T18:18:40.1181271495-001 sshd\[33124\]: Invalid user vcsa from 195.29.105.125 port 59042 2019-11-15T18:18:40.1254881495-001 sshd\[33124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.105.125 ... |
2019-11-16 08:08:10 |
| 39.42.30.185 | attackspambots | port scan and connect, tcp 23 (telnet) |
2019-11-16 07:44:35 |
| 203.91.114.6 | attack | Nov 13 06:50:49 itv-usvr-01 sshd[21358]: Invalid user yuri from 203.91.114.6 Nov 13 06:50:49 itv-usvr-01 sshd[21358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.91.114.6 Nov 13 06:50:49 itv-usvr-01 sshd[21358]: Invalid user yuri from 203.91.114.6 Nov 13 06:50:51 itv-usvr-01 sshd[21358]: Failed password for invalid user yuri from 203.91.114.6 port 33546 ssh2 |
2019-11-16 07:39:09 |
| 111.230.247.104 | attackbotsspam | Nov 15 23:57:14 tux-35-217 sshd\[3738\]: Invalid user basilius from 111.230.247.104 port 52015 Nov 15 23:57:14 tux-35-217 sshd\[3738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.104 Nov 15 23:57:16 tux-35-217 sshd\[3738\]: Failed password for invalid user basilius from 111.230.247.104 port 52015 ssh2 Nov 16 00:01:25 tux-35-217 sshd\[3749\]: Invalid user quick from 111.230.247.104 port 42323 Nov 16 00:01:25 tux-35-217 sshd\[3749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.104 ... |
2019-11-16 07:43:02 |
| 103.27.238.202 | attackbots | Nov 15 23:45:24 web8 sshd\[31067\]: Invalid user smg from 103.27.238.202 Nov 15 23:45:24 web8 sshd\[31067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202 Nov 15 23:45:25 web8 sshd\[31067\]: Failed password for invalid user smg from 103.27.238.202 port 51338 ssh2 Nov 15 23:51:17 web8 sshd\[1672\]: Invalid user apache from 103.27.238.202 Nov 15 23:51:17 web8 sshd\[1672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202 |
2019-11-16 07:52:37 |
| 104.236.142.200 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-16 08:11:03 |
| 201.47.153.167 | attackspam | Nov 12 02:15:01 itv-usvr-01 sshd[12150]: Invalid user estienne from 201.47.153.167 Nov 12 02:15:01 itv-usvr-01 sshd[12150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.47.153.167 Nov 12 02:15:01 itv-usvr-01 sshd[12150]: Invalid user estienne from 201.47.153.167 Nov 12 02:15:03 itv-usvr-01 sshd[12150]: Failed password for invalid user estienne from 201.47.153.167 port 53974 ssh2 Nov 12 02:19:54 itv-usvr-01 sshd[12344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.47.153.167 user=root Nov 12 02:19:56 itv-usvr-01 sshd[12344]: Failed password for root from 201.47.153.167 port 35066 ssh2 |
2019-11-16 07:54:41 |
| 202.74.238.87 | attack | Nov 11 09:18:38 itv-usvr-01 sshd[1542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.74.238.87 user=backup Nov 11 09:18:40 itv-usvr-01 sshd[1542]: Failed password for backup from 202.74.238.87 port 55896 ssh2 Nov 11 09:23:01 itv-usvr-01 sshd[1704]: Invalid user annemone from 202.74.238.87 Nov 11 09:23:01 itv-usvr-01 sshd[1704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.74.238.87 Nov 11 09:23:01 itv-usvr-01 sshd[1704]: Invalid user annemone from 202.74.238.87 Nov 11 09:23:03 itv-usvr-01 sshd[1704]: Failed password for invalid user annemone from 202.74.238.87 port 36442 ssh2 |
2019-11-16 07:43:43 |
| 115.88.25.178 | attackbots | Nov 16 00:48:29 srv01 sshd[4345]: Invalid user hoesing from 115.88.25.178 Nov 16 00:48:29 srv01 sshd[4345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.88.25.178 Nov 16 00:48:29 srv01 sshd[4345]: Invalid user hoesing from 115.88.25.178 Nov 16 00:48:31 srv01 sshd[4345]: Failed password for invalid user hoesing from 115.88.25.178 port 57168 ssh2 Nov 16 00:52:32 srv01 sshd[4646]: Invalid user rpm from 115.88.25.178 ... |
2019-11-16 07:56:13 |
| 194.102.35.244 | attackspam | Nov 9 14:47:24 itv-usvr-01 sshd[23184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.102.35.244 user=root Nov 9 14:47:26 itv-usvr-01 sshd[23184]: Failed password for root from 194.102.35.244 port 57872 ssh2 Nov 9 14:51:21 itv-usvr-01 sshd[23332]: Invalid user uftp from 194.102.35.244 Nov 9 14:51:21 itv-usvr-01 sshd[23332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.102.35.244 Nov 9 14:51:21 itv-usvr-01 sshd[23332]: Invalid user uftp from 194.102.35.244 Nov 9 14:51:23 itv-usvr-01 sshd[23332]: Failed password for invalid user uftp from 194.102.35.244 port 41104 ssh2 |
2019-11-16 08:14:34 |
| 180.183.155.46 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/180.183.155.46/ TH - 1H : (32) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : TH NAME ASN : ASN45758 IP : 180.183.155.46 CIDR : 180.183.0.0/16 PREFIX COUNT : 64 UNIQUE IP COUNT : 1069568 ATTACKS DETECTED ASN45758 : 1H - 1 3H - 1 6H - 3 12H - 7 24H - 13 DateTime : 2019-11-15 23:59:16 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-16 07:58:00 |
| 81.22.45.48 | attackbots | Nov 16 00:17:53 mc1 kernel: \[5146140.914538\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.48 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=12220 PROTO=TCP SPT=40318 DPT=2073 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 16 00:20:47 mc1 kernel: \[5146314.165476\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.48 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=14446 PROTO=TCP SPT=40318 DPT=3451 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 16 00:20:52 mc1 kernel: \[5146319.691612\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.48 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=35838 PROTO=TCP SPT=40318 DPT=2540 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-16 08:13:17 |
| 198.98.53.76 | attackbots | Nov 11 07:57:07 itv-usvr-01 sshd[30569]: Invalid user odroid from 198.98.53.76 Nov 11 07:57:07 itv-usvr-01 sshd[30569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.53.76 Nov 11 07:57:07 itv-usvr-01 sshd[30569]: Invalid user odroid from 198.98.53.76 Nov 11 07:57:09 itv-usvr-01 sshd[30569]: Failed password for invalid user odroid from 198.98.53.76 port 54868 ssh2 Nov 11 08:00:30 itv-usvr-01 sshd[30708]: Invalid user guest from 198.98.53.76 |
2019-11-16 08:01:55 |
| 190.196.140.254 | attackbotsspam | B: Magento admin pass /admin/ test (wrong country) |
2019-11-16 07:49:06 |
| 202.110.83.126 | attackbotsspam | 1433/tcp 1433/tcp [2019-10-26/11-15]2pkt |
2019-11-16 07:51:03 |