城市(city): unknown
省份(region): unknown
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.99.134.195 | attackbotsspam | GET /configuration.php-bak GET /configuration.php_bak GET /configuration.php.bak GET /configuration.bak GET /configuration.php_new GET /configuration.php.old GET /configuration.php.new GET /configuration.php_Old GET /configuration.php_old |
2020-10-12 07:31:56 |
| 139.99.134.195 | attackbotsspam | GET /configuration.php-bak GET /configuration.php_bak GET /configuration.php.bak GET /configuration.bak GET /configuration.php_new GET /configuration.php.old GET /configuration.php.new GET /configuration.php_Old GET /configuration.php_old |
2020-10-11 23:47:20 |
| 139.99.134.195 | attackbots | (mod_security) mod_security (id:210730) triggered by 139.99.134.195 (AU/Australia/vps-62ae2a86.vps.ovh.ca): 5 in the last 3600 secs |
2020-10-11 15:46:23 |
| 139.99.134.195 | attackbotsspam | (mod_security) mod_security (id:210730) triggered by 139.99.134.195 (AU/Australia/vps-62ae2a86.vps.ovh.ca): 5 in the last 3600 secs |
2020-10-11 09:04:23 |
| 139.99.134.195 | attackbots | (mod_security) mod_security (id:210492) triggered by 139.99.134.195 (AU/Australia/vps-62ae2a86.vps.ovh.ca): 5 in the last 3600 secs |
2020-09-13 00:35:43 |
| 139.99.134.195 | attackspam | (mod_security) mod_security (id:210492) triggered by 139.99.134.195 (AU/Australia/vps-62ae2a86.vps.ovh.ca): 5 in the last 3600 secs |
2020-09-12 16:34:51 |
| 139.99.134.177 | attackspam | reported through recidive - multiple failed attempts(SSH) |
2020-06-07 06:59:34 |
| 139.99.134.177 | attackbotsspam | May 28 14:02:41 ajax sshd[32401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.134.177 May 28 14:02:43 ajax sshd[32401]: Failed password for invalid user grogers from 139.99.134.177 port 58774 ssh2 |
2020-05-28 21:57:47 |
| 139.99.134.177 | attackspam | May 10 18:34:21 web1 sshd\[5271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.134.177 user=root May 10 18:34:24 web1 sshd\[5271\]: Failed password for root from 139.99.134.177 port 50702 ssh2 May 10 18:38:50 web1 sshd\[5645\]: Invalid user ziad from 139.99.134.177 May 10 18:38:50 web1 sshd\[5645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.134.177 May 10 18:38:52 web1 sshd\[5645\]: Failed password for invalid user ziad from 139.99.134.177 port 53890 ssh2 |
2020-05-11 12:41:41 |
| 139.99.134.167 | attackspambots | 2020-04-21T00:47:28.9865681495-001 sshd[4639]: Invalid user zs from 139.99.134.167 port 59008 2020-04-21T00:47:28.9912971495-001 sshd[4639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.ip-139-99-134.net 2020-04-21T00:47:28.9865681495-001 sshd[4639]: Invalid user zs from 139.99.134.167 port 59008 2020-04-21T00:47:30.7542451495-001 sshd[4639]: Failed password for invalid user zs from 139.99.134.167 port 59008 ssh2 2020-04-21T00:54:31.4658311495-001 sshd[5012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.ip-139-99-134.net user=root 2020-04-21T00:54:33.9676581495-001 sshd[5012]: Failed password for root from 139.99.134.167 port 47834 ssh2 ... |
2020-04-21 16:16:23 |
| 139.99.134.167 | attackbots | Apr 20 16:19:45 itv-usvr-01 sshd[15353]: Invalid user admin from 139.99.134.167 Apr 20 16:19:45 itv-usvr-01 sshd[15353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.134.167 Apr 20 16:19:45 itv-usvr-01 sshd[15353]: Invalid user admin from 139.99.134.167 Apr 20 16:19:47 itv-usvr-01 sshd[15353]: Failed password for invalid user admin from 139.99.134.167 port 36920 ssh2 Apr 20 16:26:26 itv-usvr-01 sshd[15629]: Invalid user zv from 139.99.134.167 |
2020-04-20 19:51:32 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.134.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.99.134.95. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 16:29:26 CST 2025
;; MSG SIZE rcvd: 106
95.134.99.139.in-addr.arpa domain name pointer vps-6fee8a16.vps.ovh.ca.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
95.134.99.139.in-addr.arpa name = vps-6fee8a16.vps.ovh.ca.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.232.96.101 | attack | Feb 12 14:40:09 grey postfix/smtpd\[12383\]: NOQUEUE: reject: RCPT from rebel.kumsoft.com\[91.232.96.101\]: 554 5.7.1 Service unavailable\; Client host \[91.232.96.101\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[91.232.96.101\]\; from=\ |
2020-02-13 04:55:58 |
| 175.24.139.14 | attackspambots | \[Wed Feb 12 14:40:07 2020\] \[error\] \[client 175.24.139.14\] client denied by server configuration: /var/www/html/default/TP \[Wed Feb 12 14:40:08 2020\] \[error\] \[client 175.24.139.14\] client denied by server configuration: /var/www/html/default/TP \[Wed Feb 12 14:40:08 2020\] \[error\] \[client 175.24.139.14\] client denied by server configuration: /var/www/html/default/thinkphp ... |
2020-02-13 04:53:37 |
| 68.183.110.49 | attackbots | Feb 12 20:41:54 MK-Soft-VM3 sshd[2858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.110.49 Feb 12 20:41:56 MK-Soft-VM3 sshd[2858]: Failed password for invalid user zhouh from 68.183.110.49 port 36230 ssh2 ... |
2020-02-13 05:08:45 |
| 185.220.102.7 | attackspambots | 02/12/2020-20:43:35.436795 185.220.102.7 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 34 |
2020-02-13 05:07:17 |
| 167.71.218.156 | attack | Feb 12 16:43:28 IngegnereFirenze sshd[10420]: Failed password for invalid user nou from 167.71.218.156 port 50254 ssh2 ... |
2020-02-13 04:42:20 |
| 190.236.255.117 | attackspam | 1581514814 - 02/12/2020 14:40:14 Host: 190.236.255.117/190.236.255.117 Port: 445 TCP Blocked |
2020-02-13 04:49:31 |
| 59.28.248.4 | attack | Invalid user zeng from 59.28.248.4 port 45300 |
2020-02-13 04:44:37 |
| 186.103.160.114 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 12-02-2020 13:40:21. |
2020-02-13 04:42:07 |
| 220.201.185.215 | attackspambots | 37215/tcp 37215/tcp [2020-02-10/11]2pkt |
2020-02-13 05:21:00 |
| 74.83.16.9 | attackbots | Automatic report - Port Scan Attack |
2020-02-13 04:40:21 |
| 106.13.110.194 | attack | Invalid user vagrant from 106.13.110.194 port 51340 |
2020-02-13 05:19:18 |
| 51.254.18.52 | attack | Feb 12 10:40:17 ws24vmsma01 sshd[39047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.18.52 Feb 12 10:40:20 ws24vmsma01 sshd[39047]: Failed password for invalid user pi from 51.254.18.52 port 33752 ssh2 ... |
2020-02-13 04:43:10 |
| 190.153.228.250 | attackbotsspam | 23/tcp 5500/tcp 52869/tcp... [2019-12-22/2020-02-12]13pkt,3pt.(tcp) |
2020-02-13 04:49:53 |
| 218.92.0.191 | attackspam | Feb 12 22:17:56 dcd-gentoo sshd[21399]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups Feb 12 22:17:58 dcd-gentoo sshd[21399]: error: PAM: Authentication failure for illegal user root from 218.92.0.191 Feb 12 22:17:56 dcd-gentoo sshd[21399]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups Feb 12 22:17:58 dcd-gentoo sshd[21399]: error: PAM: Authentication failure for illegal user root from 218.92.0.191 Feb 12 22:17:56 dcd-gentoo sshd[21399]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups Feb 12 22:17:58 dcd-gentoo sshd[21399]: error: PAM: Authentication failure for illegal user root from 218.92.0.191 Feb 12 22:17:58 dcd-gentoo sshd[21399]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 45916 ssh2 ... |
2020-02-13 05:19:46 |
| 42.112.97.196 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 12-02-2020 13:40:25. |
2020-02-13 04:39:59 |