城市(city): unknown
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.99.125.58 | attackspam | Blocked by Sophos UTM Network Protection . / / proto=6 . srcport=10001 . dstport=32936 . (1089) |
2020-09-17 19:04:12 |
| 139.99.125.230 | attack |
|
2020-09-01 21:06:56 |
| 139.99.125.231 | attackspambots |
|
2020-09-01 19:04:17 |
| 139.99.125.230 | attack | SmallBizIT.US 1 packets to tcp(22) |
2020-09-01 18:25:28 |
| 139.99.125.230 | attackspambots | 2020-08-31T19:25:50.598331abusebot-2.cloudsearch.cf sshd[11620]: Invalid user ubnt from 139.99.125.230 port 59752 2020-08-31T19:25:50.645193abusebot-2.cloudsearch.cf sshd[11622]: Invalid user admin from 139.99.125.230 port 35698 2020-08-31T19:25:50.647160abusebot-2.cloudsearch.cf sshd[11626]: Invalid user 1234 from 139.99.125.230 port 43918 2020-08-31T19:25:51.722996abusebot-2.cloudsearch.cf sshd[11628]: Invalid user usuario from 139.99.125.230 port 49656 ... |
2020-09-01 03:42:24 |
| 139.99.125.84 | attackspambots | Port probing on unauthorized port 22 |
2020-08-29 02:11:39 |
| 139.99.125.86 | attack | Attempted connection to port 64129. |
2020-08-24 21:24:56 |
| 139.99.125.191 | attackspam | 139.99.125.191 was recorded 6 times by 4 hosts attempting to connect to the following ports: 26014,50570,39019,51856. Incident counter (4h, 24h, all-time): 6, 31, 1174 |
2020-04-28 21:33:58 |
| 139.99.125.191 | attackbotsspam | 139.99.125.191 was recorded 11 times by 7 hosts attempting to connect to the following ports: 26014,51856,39019,20269,50570,60429. Incident counter (4h, 24h, all-time): 11, 19, 1146 |
2020-04-27 23:12:32 |
| 139.99.125.191 | attack | 139.99.125.191 was recorded 28 times by 9 hosts attempting to connect to the following ports: 50570,51856,39019,54434,56610,52084,20269,60429,51142. Incident counter (4h, 24h, all-time): 28, 86, 1123 |
2020-04-25 21:06:30 |
| 139.99.125.191 | attack | Port 27034 scan denied |
2020-03-28 19:23:50 |
| 139.99.125.191 | attackbots | 139.99.125.191 was recorded 13 times by 8 hosts attempting to connect to the following ports: 39019,54434,20269,51856,56610,52084,60429,51142. Incident counter (4h, 24h, all-time): 13, 112, 855 |
2020-03-28 06:26:16 |
| 139.99.125.191 | attackbotsspam | 139.99.125.191 was recorded 8 times by 5 hosts attempting to connect to the following ports: 60429,54434,50570,52084,51142. Incident counter (4h, 24h, all-time): 8, 116, 846 |
2020-03-28 04:19:40 |
| 139.99.125.191 | attackspam | probes 16 times on the port 34928 59003 62781 |
2020-03-27 18:25:06 |
| 139.99.125.191 | attackspambots | 139.99.125.191 was recorded 20 times by 9 hosts attempting to connect to the following ports: 51856,39019,50570,52084,54434,56610,51142,60429,26014. Incident counter (4h, 24h, all-time): 20, 82, 683 |
2020-03-26 16:58:49 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.125.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.99.125.95. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 11:48:55 CST 2025
;; MSG SIZE rcvd: 106
95.125.99.139.in-addr.arpa domain name pointer ns568799.ip-139-99-125.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
95.125.99.139.in-addr.arpa name = ns568799.ip-139-99-125.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.15.166 | attackbots | 2020-01-26T05:12:41.442988dmca.cloudsearch.cf sshd[21719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166 user=root 2020-01-26T05:12:43.023780dmca.cloudsearch.cf sshd[21719]: Failed password for root from 222.186.15.166 port 47811 ssh2 2020-01-26T05:12:45.825627dmca.cloudsearch.cf sshd[21719]: Failed password for root from 222.186.15.166 port 47811 ssh2 2020-01-26T05:12:41.442988dmca.cloudsearch.cf sshd[21719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166 user=root 2020-01-26T05:12:43.023780dmca.cloudsearch.cf sshd[21719]: Failed password for root from 222.186.15.166 port 47811 ssh2 2020-01-26T05:12:45.825627dmca.cloudsearch.cf sshd[21719]: Failed password for root from 222.186.15.166 port 47811 ssh2 2020-01-26T05:12:41.442988dmca.cloudsearch.cf sshd[21719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166 user=root 2 ... |
2020-01-26 13:26:46 |
| 45.82.34.245 | attackbotsspam | [ER hit] Tried to deliver spam. Already well known. |
2020-01-26 13:53:14 |
| 117.119.84.34 | attackspambots | Unauthorized connection attempt detected from IP address 117.119.84.34 to port 2220 [J] |
2020-01-26 13:24:42 |
| 115.236.66.242 | attack | Jan 25 21:37:58 home sshd[7907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.66.242 user=root Jan 25 21:38:00 home sshd[7907]: Failed password for root from 115.236.66.242 port 46273 ssh2 Jan 25 21:47:44 home sshd[8003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.66.242 user=root Jan 25 21:47:46 home sshd[8003]: Failed password for root from 115.236.66.242 port 25857 ssh2 Jan 25 21:49:27 home sshd[8024]: Invalid user wu from 115.236.66.242 port 18497 Jan 25 21:49:27 home sshd[8024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.66.242 Jan 25 21:49:27 home sshd[8024]: Invalid user wu from 115.236.66.242 port 18497 Jan 25 21:49:29 home sshd[8024]: Failed password for invalid user wu from 115.236.66.242 port 18497 ssh2 Jan 25 21:51:18 home sshd[8042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.66.242 user |
2020-01-26 13:42:03 |
| 80.82.77.86 | attackspam | Jan 26 06:17:40 debian-2gb-nbg1-2 kernel: \[2275132.545234\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.86 DST=195.201.40.59 LEN=130 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=45048 DPT=32768 LEN=110 |
2020-01-26 13:31:24 |
| 62.197.120.105 | attackspambots | Autoban 62.197.120.105 AUTH/CONNECT |
2020-01-26 13:25:04 |
| 201.215.176.8 | attackbotsspam | Jan 26 01:24:51 ws24vmsma01 sshd[117518]: Failed password for root from 201.215.176.8 port 60916 ssh2 Jan 26 01:54:11 ws24vmsma01 sshd[230627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.215.176.8 ... |
2020-01-26 13:45:15 |
| 88.89.44.167 | attackbots | $f2bV_matches_ltvn |
2020-01-26 13:47:36 |
| 5.70.7.63 | attackbotsspam | Jan 26 06:14:07 lnxmail61 sshd[8141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.70.7.63 Jan 26 06:14:07 lnxmail61 sshd[8141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.70.7.63 Jan 26 06:14:10 lnxmail61 sshd[8141]: Failed password for invalid user selma from 5.70.7.63 port 42092 ssh2 |
2020-01-26 13:28:56 |
| 106.13.223.160 | attackbots | Jan 26 06:14:57 localhost sshd\[27272\]: Invalid user py from 106.13.223.160 port 42498 Jan 26 06:14:57 localhost sshd\[27272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.223.160 Jan 26 06:14:59 localhost sshd\[27272\]: Failed password for invalid user py from 106.13.223.160 port 42498 ssh2 |
2020-01-26 13:30:14 |
| 49.88.112.115 | attack | Jan 26 06:38:15 vps691689 sshd[26627]: Failed password for root from 49.88.112.115 port 18593 ssh2 Jan 26 06:39:05 vps691689 sshd[26637]: Failed password for root from 49.88.112.115 port 48883 ssh2 ... |
2020-01-26 13:40:08 |
| 130.185.250.76 | attackspambots | Automatic report - Banned IP Access |
2020-01-26 13:21:50 |
| 222.186.175.215 | attackbotsspam | Jan 25 19:41:16 php1 sshd\[4639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215 user=root Jan 25 19:41:18 php1 sshd\[4639\]: Failed password for root from 222.186.175.215 port 37992 ssh2 Jan 25 19:41:35 php1 sshd\[4645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215 user=root Jan 25 19:41:37 php1 sshd\[4645\]: Failed password for root from 222.186.175.215 port 2854 ssh2 Jan 25 19:41:58 php1 sshd\[4687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215 user=root |
2020-01-26 13:44:26 |
| 91.121.157.15 | attackbotsspam | (sshd) Failed SSH login from 91.121.157.15 (FR/France/ns359003.ip-91-121-157.eu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 26 06:40:23 ubnt-55d23 sshd[3562]: Invalid user pictures from 91.121.157.15 port 60276 Jan 26 06:40:25 ubnt-55d23 sshd[3562]: Failed password for invalid user pictures from 91.121.157.15 port 60276 ssh2 |
2020-01-26 13:56:18 |
| 27.254.137.144 | attack | Jan 26 05:50:38 MainVPS sshd[22331]: Invalid user zn from 27.254.137.144 port 49374 Jan 26 05:50:38 MainVPS sshd[22331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144 Jan 26 05:50:38 MainVPS sshd[22331]: Invalid user zn from 27.254.137.144 port 49374 Jan 26 05:50:40 MainVPS sshd[22331]: Failed password for invalid user zn from 27.254.137.144 port 49374 ssh2 Jan 26 05:54:26 MainVPS sshd[28998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144 user=root Jan 26 05:54:28 MainVPS sshd[28998]: Failed password for root from 27.254.137.144 port 36306 ssh2 ... |
2020-01-26 13:37:47 |