城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): OVH Hosting Inc.
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Data Center/Web Hosting/Transit
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attackspam | SSH Brute-Forcing (server2) |
2020-09-14 01:23:11 |
| attack | (sshd) Failed SSH login from 142.44.139.12 (CA/Canada/ns552097.ip-142-44-139.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 13 07:45:47 amsweb01 sshd[6776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.139.12 user=root Sep 13 07:45:49 amsweb01 sshd[6776]: Failed password for root from 142.44.139.12 port 39114 ssh2 Sep 13 07:45:51 amsweb01 sshd[6776]: Failed password for root from 142.44.139.12 port 39114 ssh2 Sep 13 07:45:54 amsweb01 sshd[6776]: Failed password for root from 142.44.139.12 port 39114 ssh2 Sep 13 07:45:56 amsweb01 sshd[6776]: Failed password for root from 142.44.139.12 port 39114 ssh2 |
2020-09-13 17:15:49 |
| attackbots | Sep 1 23:36:35 itv-usvr-01 sshd[17505]: Invalid user admin from 142.44.139.12 |
2020-09-02 01:44:02 |
| attack | $f2bV_matches |
2020-08-24 16:07:44 |
| attackspam | SSH |
2020-08-13 12:08:12 |
| attackbots | 20 attempts against mh-misbehave-ban on lake |
2020-07-18 23:52:00 |
| attackbotsspam | srv02 SSH BruteForce Attacks 22 .. |
2020-07-13 15:55:50 |
| attackbotsspam | 2020-07-11 06:56:05.758995-0500 localhost sshd[31053]: Failed password for root from 142.44.139.12 port 34692 ssh2 |
2020-07-11 22:59:19 |
| attackspam | Jun 27 12:20:53 IngegnereFirenze sshd[30688]: User sshd from 142.44.139.12 not allowed because not listed in AllowUsers ... |
2020-06-27 22:16:02 |
| attackbotsspam | Jun 7 20:38:38 [Censored Hostname] sshd[13436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.139.12 Jun 7 20:38:40 [Censored Hostname] sshd[13436]: Failed password for invalid user advance from 142.44.139.12 port 52840 ssh2[...] |
2020-06-08 02:46:55 |
| attackbotsspam | Jun 7 12:37:05 [Censored Hostname] sshd[8225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.139.12 Jun 7 12:37:07 [Censored Hostname] sshd[8225]: Failed password for invalid user admin from 142.44.139.12 port 44494 ssh2[...] |
2020-06-07 19:14:58 |
| attackspambots | sshd jail - ssh hack attempt |
2020-04-17 13:26:29 |
| attackbotsspam | Mar 26 06:48:52 vpn01 sshd[13129]: Failed password for root from 142.44.139.12 port 38432 ssh2 Mar 26 06:49:03 vpn01 sshd[13129]: error: maximum authentication attempts exceeded for root from 142.44.139.12 port 38432 ssh2 [preauth] ... |
2020-03-26 14:40:01 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.44.139.146 | attack | Jun 23 18:29:54 debian-2gb-nbg1-2 kernel: \[15188463.973612\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=142.44.139.146 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=20047 PROTO=TCP SPT=47313 DPT=23 WINDOW=41929 RES=0x00 SYN URGP=0 |
2020-06-24 01:03:35 |
| 142.44.139.146 | attackbotsspam | SSH login attempts. |
2020-06-19 13:33:08 |
| 142.44.139.146 | attackbots | 20/6/18@08:09:06: FAIL: IoT-Telnet address from=142.44.139.146 20/6/18@08:09:06: FAIL: IoT-Telnet address from=142.44.139.146 20/6/18@08:09:06: FAIL: IoT-Telnet address from=142.44.139.146 20/6/18@08:09:06: FAIL: IoT-Telnet address from=142.44.139.146 20/6/18@08:09:06: FAIL: IoT-Telnet address from=142.44.139.146 20/6/18@08:09:06: FAIL: IoT-Telnet address from=142.44.139.146 ... |
2020-06-18 21:24:40 |
| 142.44.139.146 | attackspambots | Telnet Server BruteForce Attack |
2020-06-10 22:15:07 |
| 142.44.139.90 | attackspambots | 3389BruteforceFW21 |
2019-09-16 20:04:24 |
| 142.44.139.90 | attack | scan z |
2019-09-14 07:07:30 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.44.139.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.44.139.12. IN A
;; AUTHORITY SECTION:
. 531 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020032600 1800 900 604800 86400
;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 14:39:53 CST 2020
;; MSG SIZE rcvd: 117
12.139.44.142.in-addr.arpa domain name pointer ns552097.ip-142-44-139.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.139.44.142.in-addr.arpa name = ns552097.ip-142-44-139.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.85.42.174 | attackbotsspam | Apr 10 18:12:58 nextcloud sshd\[15644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root Apr 10 18:12:59 nextcloud sshd\[15644\]: Failed password for root from 112.85.42.174 port 57821 ssh2 Apr 10 18:13:03 nextcloud sshd\[15644\]: Failed password for root from 112.85.42.174 port 57821 ssh2 |
2020-04-11 00:25:19 |
| 137.74.172.1 | attackbotsspam | " " |
2020-04-11 00:04:43 |
| 111.231.82.175 | attackspam | k+ssh-bruteforce |
2020-04-11 00:31:19 |
| 122.238.128.124 | attackspambots | 1586520478 - 04/10/2020 14:07:58 Host: 122.238.128.124/122.238.128.124 Port: 445 TCP Blocked |
2020-04-11 00:20:49 |
| 51.89.166.45 | attack | Apr 10 11:17:08 Tower sshd[8053]: Connection from 51.89.166.45 port 34434 on 192.168.10.220 port 22 rdomain "" Apr 10 11:17:11 Tower sshd[8053]: Invalid user test from 51.89.166.45 port 34434 Apr 10 11:17:11 Tower sshd[8053]: error: Could not get shadow information for NOUSER Apr 10 11:17:11 Tower sshd[8053]: Failed password for invalid user test from 51.89.166.45 port 34434 ssh2 Apr 10 11:17:11 Tower sshd[8053]: Received disconnect from 51.89.166.45 port 34434:11: Bye Bye [preauth] Apr 10 11:17:11 Tower sshd[8053]: Disconnected from invalid user test 51.89.166.45 port 34434 [preauth] |
2020-04-11 00:07:14 |
| 188.166.150.17 | attackspambots | Apr 10 14:44:48 localhost sshd[17484]: Invalid user magnos from 188.166.150.17 port 55392 Apr 10 14:44:48 localhost sshd[17484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.17 Apr 10 14:44:48 localhost sshd[17484]: Invalid user magnos from 188.166.150.17 port 55392 Apr 10 14:44:50 localhost sshd[17484]: Failed password for invalid user magnos from 188.166.150.17 port 55392 ssh2 Apr 10 14:48:21 localhost sshd[17888]: Invalid user roy from 188.166.150.17 port 59701 ... |
2020-04-11 00:38:07 |
| 51.91.250.49 | attackspambots | Apr 10 12:20:27 ny01 sshd[21685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.250.49 Apr 10 12:20:29 ny01 sshd[21685]: Failed password for invalid user jr from 51.91.250.49 port 45624 ssh2 Apr 10 12:29:21 ny01 sshd[23236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.250.49 |
2020-04-11 00:30:17 |
| 142.93.212.10 | attack | Apr 10 18:23:21 legacy sshd[5816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.10 Apr 10 18:23:23 legacy sshd[5816]: Failed password for invalid user jens from 142.93.212.10 port 42244 ssh2 Apr 10 18:27:49 legacy sshd[6001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.10 ... |
2020-04-11 00:38:24 |
| 195.54.167.120 | attack | Unauthorized connection attempt detected from IP address 195.54.167.120 to port 5900 [T] |
2020-04-11 00:22:02 |
| 5.196.198.147 | attackspambots | SSH Brute-Force. Ports scanning. |
2020-04-11 00:22:56 |
| 51.178.49.23 | attackbotsspam | Apr 10 18:01:15 pve sshd[23033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.49.23 Apr 10 18:01:17 pve sshd[23033]: Failed password for invalid user mauro from 51.178.49.23 port 39784 ssh2 Apr 10 18:01:38 pve sshd[23111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.49.23 |
2020-04-11 00:14:24 |
| 119.63.135.116 | attackspam | Icarus honeypot on github |
2020-04-11 00:18:35 |
| 51.161.12.231 | attack | Apr 10 18:10:26 debian-2gb-nbg1-2 kernel: \[8794033.868387\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.161.12.231 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=10978 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-11 00:10:43 |
| 192.3.177.213 | attack | Apr 10 13:07:38 firewall sshd[1445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.177.213 Apr 10 13:07:38 firewall sshd[1445]: Invalid user user from 192.3.177.213 Apr 10 13:07:39 firewall sshd[1445]: Failed password for invalid user user from 192.3.177.213 port 40202 ssh2 ... |
2020-04-11 00:15:26 |
| 14.63.174.149 | attack | $f2bV_matches |
2020-04-11 00:15:46 |