Go
122.114.171.57
is a
Hacker
100 %
China
Report Abuse
147attacks reported
103Brute-ForceSSH
15SSH
7uncategorized
6Web App Attack
5Brute-Force
2HackingBrute-ForceWeb App Attack
2Hacking
2Brute-ForceWeb App Attack
1Port ScanBrute-ForceSSH
1Port ScanBrute-ForceWeb App Attack
...
5abuse reported
1Web SpamBrute-ForceSSH
1Bad Web BotExploited Host
1Web SpamHackingBrute-ForceBad Web BotExploited HostWeb App Attack
1Web SpamBad Web BotWeb App Attack
1Email Spam
1reputation reported
1uncategorized
from 70 distinct reporters
and 8 distinct sources : BadIPs.com, blocklist.net.ua, FireHOL, Blocklist.de, darklist.de, Charles Haley, GreenSnow.co, AbuseIPDB
122.114.171.57 was first signaled at 2019-06-09 11:37 and last record was at 2020-08-04 12:13.
IP

122.114.171.57

Organization
CHINA UNICOM China169 Backbone
Localisation
China
Henan, Zhengzhou
NetRange : First & Last IP
122.114.0.0 - 122.114.255.255
Network CIDR
122.114.0.0/16

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2020-08-01 10:15 attacks Brute-ForceSSH AbuseIPDB SSH Brute Force
2020-08-01 05:19 attacks Brute-ForceSSH AbuseIPDB Aug 1 21:10:48 itv-usvr-01 sshd[27989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=ro
2020-07-31 18:24 attacks SSH AbuseIPDB Aug 1 06:17:16 journals sshd\[85393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=
2020-07-31 18:05 attacks SSH AbuseIPDB Aug 1 05:58:09 journals sshd\[83606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=
2020-07-31 17:46 attacks SSH AbuseIPDB Aug 1 05:39:24 journals sshd\[81660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=
2020-07-31 17:28 attacks SSH AbuseIPDB Aug 1 05:20:25 journals sshd\[79871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=
2020-07-31 17:09 attacks SSH AbuseIPDB Aug 1 05:01:53 journals sshd\[77739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=
2020-07-31 16:50 attacks SSH AbuseIPDB Aug 1 04:43:15 journals sshd\[75874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=
2020-07-31 16:32 attacks SSH AbuseIPDB Aug 1 04:24:31 journals sshd\[73832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=
2020-07-31 16:13 attacks SSH AbuseIPDB Aug 1 04:05:57 journals sshd\[71606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=
2020-07-31 15:55 attacks SSH AbuseIPDB Aug 1 03:47:26 journals sshd\[69889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 user=
2020-07-31 12:46 attacks Brute-ForceSSH AbuseIPDB SSH Invalid Login
2020-07-31 10:14 attacks Brute-ForceSSH AbuseIPDB SSH Brute Force
2020-07-31 09:52 attacks Brute-ForceSSH AbuseIPDB 2020-07-31T20:46:31.563325v22018076590370373 sshd[20700]: Failed password for root from 122.114.171.57 port 59818 ssh2 2020-07-31T20:49:19.837819v2201
2020-07-31 03:34 attacks Brute-ForceSSH AbuseIPDB Bruteforce detected by fail2ban
2020-07-31 01:00 attacks Brute-ForceSSH AbuseIPDB Invalid user carlyim from 122.114.171.57 port 59068
2020-07-30 23:58 attacks Brute-ForceSSH AbuseIPDB Jul 31 04:58:46 Tower sshd[27680]: Connection from 122.114.171.57 port 43784 on 192.168.10.220 port 22 rdomain "" Jul 31 04:58:50 Tower sshd
2020-07-30 18:00 attacks Brute-ForceSSH AbuseIPDB Jul 31 04:41:19 vps sshd[32707]: Failed password for root from 122.114.171.57 port 34396 ssh2 Jul 31 04:55:07 vps sshd[1050]: Failed password for root
2020-07-30 18:00 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-07-30 12:46 attacks Brute-ForceSSH AbuseIPDB SSH Invalid Login
2020-07-30 08:35 attacks Brute-ForceSSH AbuseIPDB Automatic report BANNED IP
2020-07-30 08:34 attacks Brute-Force AbuseIPDB Fail2Ban Ban Triggered (2)
2020-07-30 08:32 attacks Brute-ForceSSH AbuseIPDB Jul 30 19:19:47 *hidden* sshd[7533]: Failed password for invalid user kuiliang from 122.114.171.57 port 35074 ssh2 Jul 30 19:32:20 *hidden* sshd[9498]
2020-07-30 01:04 attacks Brute-ForceSSH AbuseIPDB Invalid user carlyim from 122.114.171.57 port 59068
2020-07-30 01:03 attacks Brute-ForceSSH AbuseIPDB Invalid user carlyim from 122.114.171.57 port 59068
2020-07-30 01:02 attacks Brute-ForceSSH AbuseIPDB Invalid user carlyim from 122.114.171.57 port 59068
2020-07-30 01:01 attacks Brute-ForceSSH AbuseIPDB Invalid user carlyim from 122.114.171.57 port 59068
2020-07-30 01:00 attacks Brute-ForceSSH AbuseIPDB Invalid user carlyim from 122.114.171.57 port 59068
2020-07-30 00:33 attacks Brute-ForceSSH AbuseIPDB Jul 30 11:33:49 vps647732 sshd[1843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 30 11
2020-07-30 00:20 attacks Brute-ForceSSH AbuseIPDB 2020-07-30T11:16[Censored Hostname] sshd[9379]: Invalid user ftpadmin1 from 122.114.171.57 port 52688 2020-07-30T11:16[Censored Hostname] sshd[9379]:
2020-07-30 00:09 attacks Brute-ForceSSH AbuseIPDB Jul 30 11:09:05 vps647732 sshd[1190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 30 11
2020-07-29 23:44 attacks Brute-ForceSSH AbuseIPDB Jul 30 10:44:50 vps647732 sshd[545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 30 10:
2020-07-29 23:19 attacks Brute-ForceSSH AbuseIPDB Jul 30 10:19:47 vps647732 sshd[32112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 30 1
2020-07-29 23:14 attacks Brute-ForceSSH AbuseIPDB 2020-07-30T10:10[Censored Hostname] sshd[31801]: Invalid user administrator from 122.114.171.57 port 40802 2020-07-30T10:10[Censored Hostname] sshd[31
2020-07-29 22:54 attacks Brute-ForceSSH AbuseIPDB Jul 30 09:54:47 vps647732 sshd[31369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 30 0
2020-07-29 22:22 attacks Brute-ForceSSH AbuseIPDB Jul 30 09:22:05 vps647732 sshd[30321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 30 0
2020-07-29 22:08 attacks Brute-ForceSSH AbuseIPDB 2020-07-30T08:53[Censored Hostname] sshd[10717]: Invalid user acadmin from 122.114.171.57 port 47630 2020-07-30T08:53[Censored Hostname] sshd[10717]:
2020-07-29 21:56 attacks Brute-ForceSSH AbuseIPDB Jul 30 08:56:30 vps647732 sshd[29329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 30 0
2020-07-29 21:17 attacks Brute-Force AbuseIPDB Banned for a week because repeated abuses, for example SSH, but not only
2020-07-29 19:26 abuse Web SpamBrute-ForceSSH AbuseIPDB Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-29 19:19 attacks Brute-ForceSSH AbuseIPDB Jul 30 05:48:45 *hidden* sshd[49160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 30 05
2020-07-29 14:31 attacks Brute-ForceSSH AbuseIPDB Jul 30 02:28:21 ift sshd\[10735\]: Invalid user dan from 122.114.171.57Jul 30 02:28:23 ift sshd\[10735\]: Failed password for invalid user dan from 12
2020-07-29 08:37 attacks Brute-ForceSSH AbuseIPDB bruteforce detected
2020-07-29 07:47 attacks Brute-ForceSSH AbuseIPDB Jul 29 18:37:56 plg sshd[31084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 29 18:37:
2020-07-29 05:28 attacks Brute-ForceSSH AbuseIPDB  
2020-07-29 01:01 attacks Brute-ForceSSH AbuseIPDB Invalid user carlyim from 122.114.171.57 port 59068
2020-07-29 01:00 attacks Brute-ForceSSH AbuseIPDB Invalid user carlyim from 122.114.171.57 port 59068
2020-07-28 23:54 attacks Brute-ForceSSH AbuseIPDB Jul 29 11:54:21 root sshd[6672]: Invalid user sportsdesk from 122.114.171.57
2020-07-28 23:28 attacks Brute-ForceSSH AbuseIPDB Jul 29 10:24:19 buvik sshd[21062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 29 10:24
2020-07-28 23:10 attacks Brute-ForceSSH AbuseIPDB Jul 29 10:05:31 buvik sshd[18348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.171.57 Jul 29 10:05
2019-06-09 11:37 attacks Brute-ForceWeb App Attack AbuseIPDB Automatic report - Brute-Force Attack
2019-06-09 11:37 attacks Brute-ForceWeb App Attack AbuseIPDB Automatic report - Brute-Force Attack
2019-06-24 03:43 attacks Hacking AbuseIPDB  
2019-07-01 11:34 attacks HackingBrute-ForceWeb App Attack AbuseIPDB Multiple web server 400 error codes from same source ip. x13 - Category 10/15 PHPMyAdmin scans (looking for setup.php). x2 - Category 6/15 Web server
2019-07-03 06:28 attacks Web App Attack AbuseIPDB php WP PHPmyadamin ABUSE blocked for 12h
2019-07-03 12:23 attacks Web App Attack AbuseIPDB 10 attempts against mh-misc-ban on comet.magehost.pro
2019-07-04 23:51 abuse Web SpamBad Web BotWeb App Attack AbuseIPDB C1,DEF GET /shell.php
2019-07-05 05:15 attacks Hacking AbuseIPDB ThinkPHP Remote Code Execution Vulnerability
2019-07-07 19:52 attacks Web App Attack AbuseIPDB 10 attempts against mh-misc-ban on snow.magehost.pro
2019-07-29 02:24 attacks HackingSQL InjectionBrute-ForceWeb App Attack AbuseIPDB  
2019-06-17 09:24 attacks bi_any_0_1d BadIPs.com  
2019-06-17 09:24 attacks bi_http_0_1d BadIPs.com  
2019-06-18 08:29 abuse Email Spam blocklist_net_ua blocklist.net.ua  
2019-06-18 08:34 attacks firehol_level4 FireHOL  
2020-07-31 15:54 reputation alienvault_reputation  
2020-07-31 15:56 attacks SSH bi_sshd_0_1d BadIPs.com  
2020-07-31 15:57 attacks SSH bi_ssh_0_1d BadIPs.com  
2020-07-31 15:57 attacks blocklist_de Blocklist.de  
2020-07-31 15:57 attacks SSH blocklist_de_ssh Blocklist.de  
2020-07-31 15:59 attacks darklist_de darklist.de  
2020-07-31 16:01 attacks firehol_level2 FireHOL  
2020-07-31 16:10 attacks SSH haley_ssh Charles Haley  
2020-08-01 14:55 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2020-08-01 14:55 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2020-08-04 12:13 attacks greensnow GreenSnow.co  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 122.114.0.0 - 122.114.255.255
netname: ZZGIANT
descr: Zhengzhou GIANT Computer Network Technology Co., Ltd
descr: Room 703,Building 2,Xinghua Edifice, Hanghai Road, Jingkai District,Zhengzhou
country: CN
admin-c: YW7047-AP
tech-c: YW7047-AP
mnt-by: MAINT-CNNIC-AP
mnt-lower: MAINT-CNNIC-AP
mnt-irt: IRT-CNNIC-CN
mnt-routes: MAINT-CNNIC-AP
status: ALLOCATED PORTABLE
last-modified: 2019-08-01T07:23:18Z
source: APNIC

irt: IRT-CNNIC-CN
address: Beijing, China
e-mail: ipas@cnnic.cn
abuse-mailbox: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
auth: # Filtered
remarks: Please note that CNNIC is not an ISP and is not
remarks: empowered to investigate complaints of network abuse.
remarks: Please contact the tech-c or admin-c of the network.
mnt-by: MAINT-CNNIC-AP
last-modified: 2017-11-01T08:57:39Z
source: APNIC

person: Ren Yanjun
address: Room 703,Building 2,Xinghua Edifice, Hanghai Road, Jingkai District,Zhengzhou
country: CN
phone: +86-18937119638
e-mail: renyanjun@zzidc.com
nic-hdl: YW7047-AP
mnt-by: MAINT-CNNIC-AP
last-modified: 2019-08-01T07:19:16Z
source: APNIC
most specific ip range is highlighted
Updated : 2020-07-06