Light Theme · Dark Theme
Facebook Share Button Twitter Share Button Reddit Share Button

As an Amazon Associate I earn from qualifying purchases. All product links on this page are monetized.

Most Recent Malicious IP Addresses

 

Here are the 25 most recent attacks on the servers from which my blocklists are compiled, sorted in order of recency without regard to the type of malicious attack. These IP's are literally up to the second because this list is generated when the page is requested. All times are expressed in America / New York time, adjusted for DST when applicable.

These IP addresses were gathered from block reports issued by firewalls running on servers that the author of this site personally owns or manages, and from hacker honeypots installed on sites that the author owns or manages.

A * in the ports column means that the port(s) has/have been redacted to protect non-standard port assignments.

You can run a WHOIS search on the IP addresses by clicking the IP address links. Please note, however, that the owner of the IP address probably is not the party responsible for the malicious acts. Most Internet hackers, crackers, spammers, and scammers use either public proxy services, TOR, hacked servers, or infected or otherwise compromised personal computers to launch their attacks. Infected or compromised "Internet of Things" devices like routers, security cameras, and even thermostats also are being increasingly used for malicious Internet activity.

 

Sep 30, 2020 08:25:31 pm
139.155.2.190
Ports 80, 443
GET /wp-login.php HTTP/1.1
Sep 30, 2020 07:55:11 pm
185.214.165.113
Ports 80, 443
GET /wp-admin/admin-ajax.php?action=duplicator_download
Sep 30, 2020 07:12:29 pm
103.60.175.12
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 07:00:28 pm
212.70.149.20
Ports 25, 465, 587
Multiple failed SASL logins
Sep 30, 2020 06:03:01 pm
70.181.146.65
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 05:56:36 pm
181.47.72.108
Ports 80, 443
GET /xmlrpc.php HTTP/1.1
Sep 30, 2020 05:55:53 pm
42.238.3.121
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 05:41:41 pm
41.75.92.98
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 04:52:20 pm
61.163.192.88
Ports 25, 465, 587
Multiple failed SASL logins
Sep 30, 2020 04:15:59 pm
39.103.139.6
Ports *
Multiple failed FTP logins
Sep 30, 2020 04:11:57 pm
180.166.208.56
Ports 25, 465, 587
Multiple failed SASL logins
Sep 30, 2020 04:08:07 pm
185.193.90.26
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 04:06:46 pm
185.193.90.218
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 03:58:40 pm
45.146.167.215
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 03:57:40 pm
45.146.167.206
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 03:52:48 pm
193.198.16.220
Ports 80, 443
Web-based SQL injection attempt
Sep 30, 2020 03:36:20 pm
93.172.10.40
Ports 80, 443
GET /wp-login.php HTTP/1.1
Sep 30, 2020 03:08:44 pm
92.63.196.8
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 03:03:38 pm
92.63.196.6
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 03:03:38 pm
185.193.90.254
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 03:00:44 pm
212.70.149.83
Ports 25, 465, 587
Multiple failed SASL logins
Sep 30, 2020 02:58:04 pm
212.70.149.36
Ports 25, 465, 587
Multiple failed SASL logins
Sep 30, 2020 02:47:11 pm
5.196.217.178
Ports 25, 465, 587
Multiple failed SASL logins
Sep 30, 2020 02:17:51 pm
104.152.52.29
Ports 22, 1433, 1434, 3389, 8443, 10000, 17500
Probing for vulnerable services
Sep 30, 2020 02:08:52 pm
94.230.208.147
Ports 80, 443
Web form spam

 

Are you in business? Create an Amazon Business Account.