城市(city): Sydney
省份(region): New South Wales
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.99.221.61 | attack | $f2bV_matches |
2020-02-12 00:54:56 |
| 139.99.221.61 | attack | Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J] |
2020-02-06 16:49:17 |
| 139.99.221.61 | attackbots | Feb 2 05:58:33 haigwepa sshd[21028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 Feb 2 05:58:36 haigwepa sshd[21028]: Failed password for invalid user upload from 139.99.221.61 port 37437 ssh2 ... |
2020-02-02 13:10:17 |
| 139.99.221.61 | attack | Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J] |
2020-01-26 15:13:09 |
| 139.99.221.61 | attackspambots | Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J] |
2020-01-17 21:10:34 |
| 139.99.221.61 | attack | $f2bV_matches |
2020-01-11 23:46:20 |
| 139.99.221.61 | attackbotsspam | Invalid user tomek from 139.99.221.61 port 57996 |
2020-01-10 22:30:27 |
| 139.99.221.61 | attack | Dec 31 03:27:37 ws19vmsma01 sshd[147604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 Dec 31 03:27:39 ws19vmsma01 sshd[147604]: Failed password for invalid user liaan from 139.99.221.61 port 35512 ssh2 ... |
2019-12-31 16:00:05 |
| 139.99.221.61 | attack | Dec 4 15:46:10 Ubuntu-1404-trusty-64-minimal sshd\[22367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 user=root Dec 4 15:46:12 Ubuntu-1404-trusty-64-minimal sshd\[22367\]: Failed password for root from 139.99.221.61 port 37864 ssh2 Dec 4 15:57:05 Ubuntu-1404-trusty-64-minimal sshd\[2839\]: Invalid user admin from 139.99.221.61 Dec 4 15:57:05 Ubuntu-1404-trusty-64-minimal sshd\[2839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 Dec 4 15:57:07 Ubuntu-1404-trusty-64-minimal sshd\[2839\]: Failed password for invalid user admin from 139.99.221.61 port 51553 ssh2 |
2019-12-04 23:20:56 |
| 139.99.221.61 | attackbots | Nov 29 09:12:50 OPSO sshd\[6006\]: Invalid user dwlee200 from 139.99.221.61 port 52802 Nov 29 09:12:50 OPSO sshd\[6006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 Nov 29 09:12:52 OPSO sshd\[6006\]: Failed password for invalid user dwlee200 from 139.99.221.61 port 52802 ssh2 Nov 29 09:16:52 OPSO sshd\[6662\]: Invalid user minella from 139.99.221.61 port 43209 Nov 29 09:16:52 OPSO sshd\[6662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 |
2019-11-29 16:58:50 |
| 139.99.221.61 | attack | 2019-11-26T22:57:20.361407abusebot-7.cloudsearch.cf sshd\[24597\]: Invalid user creation from 139.99.221.61 port 44649 |
2019-11-27 07:05:52 |
| 139.99.221.61 | attack | Nov 23 16:46:03 server sshd\[23466\]: User root from 139.99.221.61 not allowed because listed in DenyUsers Nov 23 16:46:03 server sshd\[23466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 user=root Nov 23 16:46:04 server sshd\[23466\]: Failed password for invalid user root from 139.99.221.61 port 52611 ssh2 Nov 23 16:50:24 server sshd\[2950\]: User root from 139.99.221.61 not allowed because listed in DenyUsers Nov 23 16:50:24 server sshd\[2950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 user=root |
2019-11-23 23:01:16 |
| 139.99.221.61 | attackbots | $f2bV_matches |
2019-11-16 17:03:13 |
| 139.99.221.61 | attack | Nov 13 13:44:00 herz-der-gamer sshd[29216]: Invalid user nfs from 139.99.221.61 port 38126 Nov 13 13:44:00 herz-der-gamer sshd[29216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 Nov 13 13:44:00 herz-der-gamer sshd[29216]: Invalid user nfs from 139.99.221.61 port 38126 Nov 13 13:44:02 herz-der-gamer sshd[29216]: Failed password for invalid user nfs from 139.99.221.61 port 38126 ssh2 ... |
2019-11-13 22:43:42 |
| 139.99.221.61 | attackbots | Oct 9 05:56:50 host sshd\[26301\]: Invalid user 3edcxsw21qaz from 139.99.221.61 port 44388 Oct 9 05:56:50 host sshd\[26301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.221.61 ... |
2019-10-09 13:06:51 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.221.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.99.221.198. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023122200 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 22 14:17:16 CST 2023
;; MSG SIZE rcvd: 107
Host 198.221.99.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 198.221.99.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 184.105.247.251 | attack | 9200/tcp 548/tcp 3389/tcp... [2019-09-07/11-04]37pkt,5pt.(tcp),2pt.(udp) |
2019-11-04 18:38:36 |
| 182.72.104.106 | attack | Nov 4 10:36:42 MK-Soft-Root2 sshd[21787]: Failed password for root from 182.72.104.106 port 34314 ssh2 ... |
2019-11-04 18:09:59 |
| 218.240.145.2 | attack | firewall-block, port(s): 1433/tcp |
2019-11-04 18:37:21 |
| 106.75.7.70 | attackbots | Nov 4 09:30:53 ns41 sshd[10391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.7.70 |
2019-11-04 18:45:21 |
| 58.22.61.212 | attackspambots | $f2bV_matches |
2019-11-04 18:34:13 |
| 178.128.85.156 | attack | SSH/22 MH Probe, BF, Hack - |
2019-11-04 18:27:48 |
| 218.207.20.109 | attack | heavy scanner, scan for php phpmyadmin database files |
2019-11-04 18:46:32 |
| 173.212.219.135 | attack | Automatic report - Banned IP Access |
2019-11-04 18:14:39 |
| 187.120.216.22 | attack | port scan and connect, tcp 23 (telnet) |
2019-11-04 18:27:27 |
| 104.248.88.100 | attackbots | Automatic report - XMLRPC Attack |
2019-11-04 18:45:42 |
| 216.144.251.86 | attackspam | 2019-11-04T01:14:16.593095WS-Zach sshd[1145154]: Invalid user uranus from 216.144.251.86 port 58942 2019-11-04T01:14:16.596728WS-Zach sshd[1145154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.144.251.86 2019-11-04T01:14:16.593095WS-Zach sshd[1145154]: Invalid user uranus from 216.144.251.86 port 58942 2019-11-04T01:14:18.573383WS-Zach sshd[1145154]: Failed password for invalid user uranus from 216.144.251.86 port 58942 ssh2 2019-11-04T01:26:36.800051WS-Zach sshd[1146714]: Invalid user ck from 216.144.251.86 port 59540 ... |
2019-11-04 18:15:12 |
| 185.216.32.170 | attackspambots | 11/04/2019-11:22:11.415868 185.216.32.170 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 30 |
2019-11-04 18:22:25 |
| 212.156.151.182 | attackbotsspam | SMB DoublePulsar Ping Detection, PTR: 212.156.151.182.static.turktelekom.com.tr. |
2019-11-04 18:36:28 |
| 91.121.205.83 | attack | Nov 4 11:11:31 SilenceServices sshd[9246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.205.83 Nov 4 11:11:33 SilenceServices sshd[9246]: Failed password for invalid user inssserver from 91.121.205.83 port 41510 ssh2 Nov 4 11:18:25 SilenceServices sshd[11177]: Failed password for root from 91.121.205.83 port 51468 ssh2 |
2019-11-04 18:39:32 |
| 184.82.193.253 | attack | SMTP-sasl brute force ... |
2019-11-04 18:15:33 |