城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): Tencent Cloud Computing (Beijing) Co. Ltd.
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Data Center/Web Hosting/Transit
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attack | Brute-force attempt banned |
2020-10-10 01:20:42 |
| attackspam | Invalid user team from 139.155.42.189 port 29371 |
2020-09-28 01:07:00 |
| attackspambots | SSH Brute-Forcing (server1) |
2020-09-27 17:10:11 |
| attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): |
2020-09-25 04:37:02 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.155.42.212 | attackspambots | Aug 25 23:36:58 buvik sshd[16329]: Invalid user maven from 139.155.42.212 Aug 25 23:36:58 buvik sshd[16329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.42.212 Aug 25 23:37:00 buvik sshd[16329]: Failed password for invalid user maven from 139.155.42.212 port 40970 ssh2 ... |
2020-08-26 07:40:32 |
| 139.155.42.212 | attackspambots | leo_www |
2020-08-16 20:36:08 |
| 139.155.42.212 | attackbots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-11T04:54:11Z and 2020-08-11T05:06:10Z |
2020-08-11 19:22:51 |
| 139.155.42.212 | attackspam | Lines containing failures of 139.155.42.212 Aug 3 06:01:53 shared05 sshd[19650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.42.212 user=r.r Aug 3 06:01:55 shared05 sshd[19650]: Failed password for r.r from 139.155.42.212 port 54814 ssh2 Aug 3 06:01:56 shared05 sshd[19650]: Received disconnect from 139.155.42.212 port 54814:11: Bye Bye [preauth] Aug 3 06:01:56 shared05 sshd[19650]: Disconnected from authenticating user r.r 139.155.42.212 port 54814 [preauth] Aug 3 06:16:35 shared05 sshd[24946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.42.212 user=r.r Aug 3 06:16:37 shared05 sshd[24946]: Failed password for r.r from 139.155.42.212 port 57072 ssh2 Aug 3 06:16:41 shared05 sshd[24946]: Received disconnect from 139.155.42.212 port 57072:11: Bye Bye [preauth] Aug 3 06:16:41 shared05 sshd[24946]: Disconnected from authenticating user r.r 139.155.42.212 port 57072........ ------------------------------ |
2020-08-08 23:11:27 |
| 139.155.42.212 | attackbotsspam | Lines containing failures of 139.155.42.212 Aug 3 06:01:53 shared05 sshd[19650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.42.212 user=r.r Aug 3 06:01:55 shared05 sshd[19650]: Failed password for r.r from 139.155.42.212 port 54814 ssh2 Aug 3 06:01:56 shared05 sshd[19650]: Received disconnect from 139.155.42.212 port 54814:11: Bye Bye [preauth] Aug 3 06:01:56 shared05 sshd[19650]: Disconnected from authenticating user r.r 139.155.42.212 port 54814 [preauth] Aug 3 06:16:35 shared05 sshd[24946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.42.212 user=r.r Aug 3 06:16:37 shared05 sshd[24946]: Failed password for r.r from 139.155.42.212 port 57072 ssh2 Aug 3 06:16:41 shared05 sshd[24946]: Received disconnect from 139.155.42.212 port 57072:11: Bye Bye [preauth] Aug 3 06:16:41 shared05 sshd[24946]: Disconnected from authenticating user r.r 139.155.42.212 port 57072........ ------------------------------ |
2020-08-08 07:03:15 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.155.42.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11925
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.155.42.189. IN A
;; AUTHORITY SECTION:
. 595 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020092401 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 25 04:36:58 CST 2020
;; MSG SIZE rcvd: 118
Host 189.42.155.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 189.42.155.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.230.155.6 | attackbots | email spam |
2020-01-22 17:15:04 |
| 103.105.70.9 | attackbots | spam |
2020-01-22 17:15:24 |
| 185.33.114.5 | attackbots | spam |
2020-01-22 17:27:13 |
| 114.217.0.245 | attackspambots | unauthorized connection attempt |
2020-01-22 17:34:52 |
| 14.20.235.42 | attackspam | spam |
2020-01-22 17:08:52 |
| 105.29.67.20 | attackbots | spam |
2020-01-22 17:36:47 |
| 92.247.31.37 | attack | spam |
2020-01-22 17:42:20 |
| 186.24.50.162 | attack | email spam |
2020-01-22 17:26:27 |
| 190.131.232.42 | attack | spam |
2020-01-22 17:11:29 |
| 200.217.168.98 | attack | email spam |
2020-01-22 17:22:32 |
| 185.153.199.242 | attackbots | 01/22/2020-04:09:49.785171 185.153.199.242 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-01-22 17:12:16 |
| 185.101.238.13 | attack | spam |
2020-01-22 17:26:51 |
| 203.99.110.214 | attack | spam |
2020-01-22 17:21:43 |
| 220.79.34.109 | attack | spam |
2020-01-22 17:09:10 |
| 13.234.121.75 | attackspambots | spam |
2020-01-22 17:21:22 |