城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.99.203.12 | attackspambots | Oct 6 18:07:32 scw-gallant-ride sshd[18950]: Failed password for root from 139.99.203.12 port 50320 ssh2 |
2020-10-07 02:23:59 |
| 139.99.203.12 | attack | $f2bV_matches |
2020-10-06 18:20:20 |
| 139.99.203.12 | attackspambots | Sep 24 11:34:25 gw1 sshd[17805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.203.12 Sep 24 11:34:28 gw1 sshd[17805]: Failed password for invalid user sandbox from 139.99.203.12 port 56940 ssh2 ... |
2020-09-24 22:23:01 |
| 139.99.203.12 | attackspam | Sep 24 11:12:30 gw1 sshd[17259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.203.12 Sep 24 11:12:32 gw1 sshd[17259]: Failed password for invalid user minecraft from 139.99.203.12 port 34858 ssh2 ... |
2020-09-24 14:15:22 |
| 139.99.203.12 | attackbots | 2020-09-24T02:28:50.439441hostname sshd[12857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.203.12 user=root 2020-09-24T02:28:52.294815hostname sshd[12857]: Failed password for root from 139.99.203.12 port 37342 ssh2 2020-09-24T02:31:52.026106hostname sshd[14044]: Invalid user teamspeak from 139.99.203.12 port 53466 ... |
2020-09-24 05:42:47 |
| 139.99.203.12 | attackspambots | Sep 5 23:57:36 localhost sshd[458187]: Invalid user w from 139.99.203.12 port 54558 ... |
2020-09-05 23:10:16 |
| 139.99.203.12 | attackspambots | (sshd) Failed SSH login from 139.99.203.12 (AU/Australia/12.ip-139-99-203.eu): 12 in the last 3600 secs |
2020-09-05 14:44:41 |
| 139.99.203.12 | attackspambots | (sshd) Failed SSH login from 139.99.203.12 (AU/Australia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 4 15:51:41 server4 sshd[23678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.203.12 user=root Sep 4 15:51:43 server4 sshd[23678]: Failed password for root from 139.99.203.12 port 51122 ssh2 Sep 4 15:58:58 server4 sshd[28369]: Invalid user bitnami from 139.99.203.12 Sep 4 15:58:58 server4 sshd[28369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.203.12 Sep 4 15:59:00 server4 sshd[28369]: Failed password for invalid user bitnami from 139.99.203.12 port 47564 ssh2 |
2020-09-05 07:23:26 |
| 139.99.203.12 | attackbotsspam | web-1 [ssh_2] SSH Attack |
2020-08-29 14:43:16 |
| 139.99.203.12 | attack | Aug 27 01:23:19 ns382633 sshd\[12223\]: Invalid user erpnext from 139.99.203.12 port 45108 Aug 27 01:23:19 ns382633 sshd\[12223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.203.12 Aug 27 01:23:21 ns382633 sshd\[12223\]: Failed password for invalid user erpnext from 139.99.203.12 port 45108 ssh2 Aug 27 01:31:17 ns382633 sshd\[13829\]: Invalid user ubuntu from 139.99.203.12 port 50782 Aug 27 01:31:17 ns382633 sshd\[13829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.203.12 |
2020-08-27 09:38:40 |
| 139.99.203.12 | attackbotsspam | web-1 [ssh] SSH Attack |
2020-08-23 18:54:05 |
| 139.99.201.155 | attackspambots | $f2bV_matches |
2020-08-18 14:27:58 |
| 139.99.201.155 | attack | Aug 18 04:18:51 itv-usvr-01 sshd[24676]: Invalid user mn from 139.99.201.155 Aug 18 04:18:51 itv-usvr-01 sshd[24676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.201.155 Aug 18 04:18:51 itv-usvr-01 sshd[24676]: Invalid user mn from 139.99.201.155 Aug 18 04:18:53 itv-usvr-01 sshd[24676]: Failed password for invalid user mn from 139.99.201.155 port 42350 ssh2 Aug 18 04:27:52 itv-usvr-01 sshd[25015]: Invalid user yves from 139.99.201.155 |
2020-08-18 07:39:53 |
| 139.99.208.2 | attack | Automatic report - XMLRPC Attack |
2020-07-21 03:14:55 |
| 139.99.209.229 | attack | Attempted connection to port 43784. |
2020-05-05 11:26:10 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.20.233
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42644
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.99.20.233. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:08:29 CST 2022
;; MSG SIZE rcvd: 106
233.20.99.139.in-addr.arpa domain name pointer ip233.ip-139-99-20.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
233.20.99.139.in-addr.arpa name = ip233.ip-139-99-20.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 61.12.67.133 | attackspam | Aug 8 00:06:18 * sshd[10395]: Failed password for root from 61.12.67.133 port 28886 ssh2 |
2020-08-08 06:26:41 |
| 59.34.233.229 | attackbots | Aug 7 22:22:54 buvik sshd[23702]: Failed password for root from 59.34.233.229 port 48523 ssh2 Aug 7 22:26:23 buvik sshd[24242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.34.233.229 user=root Aug 7 22:26:26 buvik sshd[24242]: Failed password for root from 59.34.233.229 port 46642 ssh2 ... |
2020-08-08 06:24:30 |
| 106.13.176.163 | attackbots | Aug 7 23:59:57 vps639187 sshd\[28282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.176.163 user=root Aug 7 23:59:59 vps639187 sshd\[28282\]: Failed password for root from 106.13.176.163 port 38432 ssh2 Aug 8 00:04:42 vps639187 sshd\[28352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.176.163 user=root ... |
2020-08-08 06:27:57 |
| 115.28.186.105 | attackbots | SSH brute force attempt |
2020-08-08 06:19:19 |
| 89.64.29.33 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-08-08 06:35:15 |
| 61.177.172.142 | attackspam | Failed password for invalid user from 61.177.172.142 port 22557 ssh2 |
2020-08-08 06:20:10 |
| 196.41.122.94 | attack | 196.41.122.94 - - [07/Aug/2020:22:25:46 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 196.41.122.94 - - [07/Aug/2020:22:25:47 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 196.41.122.94 - - [07/Aug/2020:22:25:48 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-08 06:44:39 |
| 195.228.233.86 | attack | Automatic report - Port Scan Attack |
2020-08-08 06:41:22 |
| 64.111.126.43 | attackbots | 64.111.126.43 - - [07/Aug/2020:22:26:12 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 64.111.126.43 - - [07/Aug/2020:22:26:14 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 64.111.126.43 - - [07/Aug/2020:22:26:15 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-08 06:29:47 |
| 106.12.171.188 | attackbots | Aug 7 13:26:29 propaganda sshd[100219]: Connection from 106.12.171.188 port 35238 on 10.0.0.160 port 22 rdomain "" Aug 7 13:26:30 propaganda sshd[100219]: Connection closed by 106.12.171.188 port 35238 [preauth] |
2020-08-08 06:20:59 |
| 14.169.158.108 | attack | Automatic report - Port Scan Attack |
2020-08-08 06:33:10 |
| 49.234.226.13 | attackbots | Aug 6 07:55:25 our-server-hostname sshd[2980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.226.13 user=r.r Aug 6 07:55:27 our-server-hostname sshd[2980]: Failed password for r.r from 49.234.226.13 port 60976 ssh2 Aug 6 13:59:32 our-server-hostname sshd[3851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.226.13 user=r.r Aug 6 13:59:35 our-server-hostname sshd[3851]: Failed password for r.r from 49.234.226.13 port 52834 ssh2 Aug 6 14:12:53 our-server-hostname sshd[7570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.226.13 user=r.r Aug 6 14:12:55 our-server-hostname sshd[7570]: Failed password for r.r from 49.234.226.13 port 33242 ssh2 Aug 6 14:16:49 our-server-hostname sshd[8519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.226.13 user=r.r Aug 6 14:16:50 our-ser........ ------------------------------- |
2020-08-08 06:44:26 |
| 51.38.65.208 | attack | Aug 7 23:40:49 mout sshd[19231]: Disconnected from authenticating user root 51.38.65.208 port 33850 [preauth] Aug 8 00:07:14 mout sshd[21633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.65.208 user=root Aug 8 00:07:16 mout sshd[21633]: Failed password for root from 51.38.65.208 port 35514 ssh2 |
2020-08-08 06:13:03 |
| 152.136.196.155 | attackbots | Aug 7 13:28:17 pixelmemory sshd[1389757]: Failed password for root from 152.136.196.155 port 39754 ssh2 Aug 7 13:34:46 pixelmemory sshd[1412968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.196.155 user=root Aug 7 13:34:48 pixelmemory sshd[1412968]: Failed password for root from 152.136.196.155 port 51572 ssh2 Aug 7 13:41:11 pixelmemory sshd[1451944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.196.155 user=root Aug 7 13:41:13 pixelmemory sshd[1451944]: Failed password for root from 152.136.196.155 port 35148 ssh2 ... |
2020-08-08 06:22:40 |
| 49.88.112.112 | attackspambots | Aug 7 18:17:47 plusreed sshd[26643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112 user=root Aug 7 18:17:49 plusreed sshd[26643]: Failed password for root from 49.88.112.112 port 37440 ssh2 ... |
2020-08-08 06:21:44 |