城市(city): unknown
省份(region): unknown
国家(country): Spain
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 2.139.215.255 | attackbots | May 8 18:45:04 mail sshd\[17169\]: Invalid user postgres from 2.139.215.255 May 8 18:45:04 mail sshd\[17169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255 May 8 18:45:06 mail sshd\[17169\]: Failed password for invalid user postgres from 2.139.215.255 port 43077 ssh2 ... |
2020-05-09 01:46:48 |
| 2.139.215.255 | attackspam | Apr 26 04:44:34 ws12vmsma01 sshd[44373]: Invalid user gogs from 2.139.215.255 Apr 26 04:44:38 ws12vmsma01 sshd[44373]: Failed password for invalid user gogs from 2.139.215.255 port 37783 ssh2 Apr 26 04:46:29 ws12vmsma01 sshd[44619]: Invalid user admin from 2.139.215.255 ... |
2020-04-26 17:33:22 |
| 2.139.215.255 | attackbots | Invalid user wy from 2.139.215.255 port 37024 |
2020-04-19 03:52:39 |
| 2.139.215.255 | attackbots | $f2bV_matches |
2020-04-16 12:30:46 |
| 2.139.215.255 | attackspam | Apr 10 07:41:07 mail sshd[28910]: Invalid user dts from 2.139.215.255 ... |
2020-04-10 14:40:58 |
| 2.139.215.255 | attack | Apr 9 03:05:55 ws24vmsma01 sshd[166091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255 Apr 9 03:05:57 ws24vmsma01 sshd[166091]: Failed password for invalid user test from 2.139.215.255 port 49261 ssh2 ... |
2020-04-09 18:34:30 |
| 2.139.215.255 | attack | Apr 8 00:28:25 ny01 sshd[7624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255 Apr 8 00:28:27 ny01 sshd[7624]: Failed password for invalid user felix from 2.139.215.255 port 63676 ssh2 Apr 8 00:32:19 ny01 sshd[8131]: Failed password for root from 2.139.215.255 port 26076 ssh2 |
2020-04-08 12:53:23 |
| 2.139.215.255 | attack | Invalid user cacti from 2.139.215.255 port 40846 |
2020-04-04 18:26:36 |
| 2.139.215.255 | attackbots | Mar 31 01:46:12 host01 sshd[2635]: Failed password for root from 2.139.215.255 port 18730 ssh2 Mar 31 01:50:17 host01 sshd[3665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255 Mar 31 01:50:20 host01 sshd[3665]: Failed password for invalid user kafka from 2.139.215.255 port 32265 ssh2 ... |
2020-03-31 08:11:36 |
| 2.139.215.255 | attackspam | Mar 28 23:05:38 Ubuntu-1404-trusty-64-minimal sshd\[25162\]: Invalid user ubuntu from 2.139.215.255 Mar 28 23:05:38 Ubuntu-1404-trusty-64-minimal sshd\[25162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255 Mar 28 23:05:39 Ubuntu-1404-trusty-64-minimal sshd\[25162\]: Failed password for invalid user ubuntu from 2.139.215.255 port 58351 ssh2 Mar 28 23:07:33 Ubuntu-1404-trusty-64-minimal sshd\[25821\]: Invalid user user from 2.139.215.255 Mar 28 23:07:33 Ubuntu-1404-trusty-64-minimal sshd\[25821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255 |
2020-03-29 06:13:24 |
| 2.139.215.255 | attackspam | sshd jail - ssh hack attempt |
2020-03-27 03:59:04 |
| 2.139.215.255 | attackbotsspam | 2020-03-25T00:29:34.413965linuxbox-skyline sshd[15786]: Invalid user ubuntu from 2.139.215.255 port 51606 ... |
2020-03-25 14:46:47 |
| 2.139.215.255 | attackbots | (sshd) Failed SSH login from 2.139.215.255 (ES/Spain/Catalonia/Barcelona/255.red-2-139-215.staticip.rima-tde.net/[AS3352 Telefonica De Espana]): 1 in the last 3600 secs |
2020-03-20 02:58:52 |
| 2.139.215.255 | attack | Brute-force attempt banned |
2020-03-18 22:37:05 |
| 2.139.215.255 | attackbotsspam | Jan 4 10:15:27 pi sshd[2496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.215.255 Jan 4 10:15:29 pi sshd[2496]: Failed password for invalid user admin from 2.139.215.255 port 35403 ssh2 |
2020-03-13 22:53:08 |
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '2.138.0.0 - 2.139.255.255'
% Abuse contact for '2.138.0.0 - 2.139.255.255' is 'nemesys@telefonica.es'
inetnum: 2.138.0.0 - 2.139.255.255
netname: RIMA
descr: Red de servicios IP
descr: Spain
country: ES
admin-c: ATDE1-RIPE
tech-c: TTdE1-RIPE
remarks: NCC#2011012395
status: ASSIGNED PA
mnt-by: MAINT-AS3352
created: 2015-01-20T17:53:35Z
last-modified: 2016-04-22T09:16:11Z
source: RIPE # Filtered
role: Administradores Telefonica de Espana
address: Ronda de la Comunicacion s/n
address: Edificio Norte 1, planta 6
address: 28050 Madrid
address: SPAIN
org: ORG-TDE1-RIPE
admin-c: KIX1-RIPE
tech-c: TTDE1-RIPE
nic-hdl: ATDE1-RIPE
mnt-by: MAINT-AS3352
abuse-mailbox: nemesys@telefonica.es
created: 2006-01-18T12:24:41Z
last-modified: 2018-09-18T10:36:42Z
source: RIPE # Filtered
role: Tecnicos Telefonica de Espana
address: Ronda de la Comunicacion S/N
address: 28050-MADRID
address: SPAIN
org: ORG-TDE1-RIPE
admin-c: TTE2-RIPE
tech-c: TTE2-RIPE
nic-hdl: TTdE1-RIPE
mnt-by: MAINT-AS3352
abuse-mailbox: nemesys@telefonica.es
created: 2006-01-18T12:39:59Z
last-modified: 2018-09-18T12:08:51Z
source: RIPE # Filtered
% Information related to '2.139.0.0/16AS3352'
route: 2.139.0.0/16
descr: RIMA (Red IP Multi Acceso)
origin: AS3352
mnt-by: MAINT-AS3352
mnt-routes: MAINT-AS3352
mnt-lower: MAINT-AS3352
created: 2010-11-08T14:28:35Z
last-modified: 2010-11-08T14:28:35Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.139.215.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.139.215.96. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026042202 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 09:44:16 CST 2026
;; MSG SIZE rcvd: 105
96.215.139.2.in-addr.arpa domain name pointer 96.red-2-139-215.staticip.rima-tde.net.
b'96.215.139.2.in-addr.arpa name = 96.red-2-139-215.staticip.rima-tde.net.
Authoritative answers can be found from:
'
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 149.56.140.24 | attackbotsspam | 149.56.140.24 - - \[24/Jun/2019:14:04:22 +0200\] "POST /wp-login.php HTTP/1.1" 200 1860 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 149.56.140.24 - - \[24/Jun/2019:14:04:23 +0200\] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2019-06-25 00:04:38 |
| 198.108.67.43 | attackbotsspam | " " |
2019-06-24 23:56:40 |
| 95.85.39.203 | attackspam | 2019-06-24T15:48:58.356389abusebot-6.cloudsearch.cf sshd\[9897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.39.203 user=root |
2019-06-25 00:20:10 |
| 37.49.224.67 | attackbotsspam | ¯\_(ツ)_/¯ |
2019-06-25 00:18:10 |
| 141.98.10.52 | attackbotsspam | Rude login attack (5 tries in 1d) |
2019-06-25 00:39:04 |
| 82.81.2.131 | attackbotsspam | DATE:2019-06-24_14:04:26, IP:82.81.2.131, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-06-25 00:03:19 |
| 59.153.84.253 | attackbotsspam | Trying to deliver email spam, but blocked by RBL |
2019-06-24 23:45:29 |
| 78.26.172.117 | attackbotsspam | Telnet Server BruteForce Attack |
2019-06-24 23:41:51 |
| 177.8.255.111 | attackspambots | failed_logins |
2019-06-25 00:26:07 |
| 68.57.86.37 | attack | $f2bV_matches |
2019-06-25 00:35:02 |
| 66.249.65.120 | attack | 66.249.65.120 - - [24/Jun/2019:19:02:26 +0700] "GET /index.php/121-peralatan-observasiklimatologi/aktinograf/78-aktinograf HTTP/1.1" 301 314 8064 "-" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.96 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" - % 66.249.65.120 66.249.65.120 103.27.207.197 314 2822 - - - - - https://karangploso.jatim.bmkg.go.id/index.php/121-peralatan-observasiklimatologi/aktinograf/78-aktinograf HTTP/1.1 0 XRC70rB4H4Sl@VgBIuCaUQAAAFE GET 80 20141 - 0 /index.php/121-peralatan-observasiklimatologi/aktinograf/78-aktinograf karangploso.jatim.bmkg.go.id karangploso.jatim.bmkg.go.id + 635 8699 ... |
2019-06-25 00:49:07 |
| 104.248.16.13 | attackbotsspam | 104.248.16.13 - - \[24/Jun/2019:16:19:57 +0200\] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.248.16.13 - - \[24/Jun/2019:16:19:58 +0200\] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.248.16.13 - - \[24/Jun/2019:16:20:01 +0200\] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.248.16.13 - - \[24/Jun/2019:16:20:03 +0200\] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.248.16.13 - - \[24/Jun/2019:16:20:13 +0200\] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.248.16.13 - - \[24/Jun/2019:16:20:19 +0200\] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) |
2019-06-24 23:44:57 |
| 175.112.9.160 | attackspam | Telnet Server BruteForce Attack |
2019-06-25 00:06:28 |
| 176.9.73.130 | attack | SSH invalid-user multiple login try |
2019-06-24 23:58:32 |
| 117.86.76.120 | attack | 2019-06-24T13:57:00.198305 X postfix/smtpd[60116]: warning: unknown[117.86.76.120]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-24T14:24:43.100961 X postfix/smtpd[64266]: warning: unknown[117.86.76.120]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-24T14:52:53.392825 X postfix/smtpd[3394]: warning: unknown[117.86.76.120]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-06-24 23:41:20 |