城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): ChinaNet Guangdong Province Network
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attackbots | Dec 31 09:53:11 web1 postfix/smtpd[27446]: warning: unknown[219.135.139.245]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-31 23:43:37 |
| attack | Nov 17 00:21:23 mail postfix/smtpd[14787]: warning: unknown[219.135.139.245]: SASL LOGIN authentication failed: authentication failure |
2019-11-17 21:06:08 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 219.135.139.130 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2020-07-17 00:45:22 |
| 219.135.139.242 | attackbots | Mar 23 01:05:03 WHD8 postfix/smtpd\[49804\]: warning: unknown\[219.135.139.242\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 23 01:05:11 WHD8 postfix/smtpd\[49869\]: warning: unknown\[219.135.139.242\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 31 00:02:49 WHD8 postfix/smtpd\[35160\]: warning: unknown\[219.135.139.242\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-06 03:04:46 |
| 219.135.139.243 | attackbotsspam | Mar 26 05:43:59 WHD8 postfix/smtpd\[94626\]: warning: unknown\[219.135.139.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 6 07:18:50 WHD8 postfix/smtpd\[93580\]: warning: unknown\[219.135.139.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 6 07:18:59 WHD8 postfix/smtpd\[93467\]: warning: unknown\[219.135.139.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-06 02:49:23 |
| 219.135.139.244 | attackspam | Dec 31 09:53:01 web1 postfix/smtpd[26895]: warning: unknown[219.135.139.244]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-31 23:54:28 |
| 219.135.139.242 | attackspam | Dec 31 09:53:07 web1 postfix/smtpd[27446]: warning: unknown[219.135.139.242]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-31 23:46:07 |
| 219.135.139.242 | attack | Nov 17 00:21:31 mail postfix/smtpd[14815]: warning: unknown[219.135.139.242]: SASL LOGIN authentication failed: authentication failure |
2019-11-17 20:59:20 |
| 219.135.139.244 | attackspam | 2019-10-21 22:51:20 dovecot_login authenticator failed for (sienawx.org) [219.135.139.244]:23459 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=nologin@lerctr.org) 2019-10-21 22:51:55 dovecot_login authenticator failed for (sienawx.org) [219.135.139.244]:16062 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=android@lerctr.org) 2019-10-21 22:52:12 dovecot_login authenticator failed for (sienawx.org) [219.135.139.244]:62968 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=android@lerctr.org) ... |
2019-10-22 16:44:47 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.135.139.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;219.135.139.245. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019111700 1800 900 604800 86400
;; Query time: 125 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 17 21:06:03 CST 2019
;; MSG SIZE rcvd: 119
245.139.135.219.in-addr.arpa domain name pointer 245.139.135.219.broad.gz.gd.dynamic.163data.com.cn.
245.139.135.219.in-addr.arpa name = 245.139.135.219.broad.gz.gd.dynamic.163data.com.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.3.247.10 | attack | Jul 28 07:58:53 nextcloud sshd\[15405\]: Invalid user xupeng from 192.3.247.10 Jul 28 07:58:53 nextcloud sshd\[15405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.247.10 Jul 28 07:58:55 nextcloud sshd\[15405\]: Failed password for invalid user xupeng from 192.3.247.10 port 46138 ssh2 |
2020-07-28 14:50:02 |
| 118.24.2.59 | attack | Jul 28 08:50:39 |
2020-07-28 14:51:31 |
| 77.121.81.204 | attackspambots | Jul 28 12:48:17 dhoomketu sshd[1962713]: Invalid user ls from 77.121.81.204 port 23672 Jul 28 12:48:17 dhoomketu sshd[1962713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.121.81.204 Jul 28 12:48:17 dhoomketu sshd[1962713]: Invalid user ls from 77.121.81.204 port 23672 Jul 28 12:48:18 dhoomketu sshd[1962713]: Failed password for invalid user ls from 77.121.81.204 port 23672 ssh2 Jul 28 12:52:13 dhoomketu sshd[1962765]: Invalid user xushan from 77.121.81.204 port 26761 ... |
2020-07-28 15:22:36 |
| 124.232.133.205 | attackbots | Invalid user dev from 124.232.133.205 port 1556 |
2020-07-28 14:40:57 |
| 149.202.15.197 | attackspambots | Brute forcing email accounts |
2020-07-28 15:04:02 |
| 116.48.178.2 | attackspambots | Unauthorized connection attempt detected from IP address 116.48.178.2 to port 5555 |
2020-07-28 14:54:43 |
| 59.92.235.44 | attack | Unauthorised access (Jul 28) SRC=59.92.235.44 LEN=52 TTL=107 ID=20344 DF TCP DPT=445 WINDOW=8192 SYN |
2020-07-28 14:51:54 |
| 185.97.116.165 | attackspambots | Invalid user sdtdserver from 185.97.116.165 port 48714 |
2020-07-28 15:24:22 |
| 162.241.29.139 | attackbots | 162.241.29.139 - - [28/Jul/2020:05:40:21 +0100] "POST /wp-login.php HTTP/1.1" 200 2121 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 162.241.29.139 - - [28/Jul/2020:05:40:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 162.241.29.139 - - [28/Jul/2020:05:40:25 +0100] "POST /wp-login.php HTTP/1.1" 200 2092 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-28 14:50:41 |
| 61.177.172.102 | attackbotsspam | Jul 28 08:41:52 * sshd[17400]: Failed password for root from 61.177.172.102 port 54410 ssh2 |
2020-07-28 14:46:41 |
| 180.76.142.19 | attack | Jul 28 06:42:48 plex-server sshd[625948]: Invalid user lixiangfeng from 180.76.142.19 port 52160 Jul 28 06:42:48 plex-server sshd[625948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.142.19 Jul 28 06:42:48 plex-server sshd[625948]: Invalid user lixiangfeng from 180.76.142.19 port 52160 Jul 28 06:42:49 plex-server sshd[625948]: Failed password for invalid user lixiangfeng from 180.76.142.19 port 52160 ssh2 Jul 28 06:44:38 plex-server sshd[626879]: Invalid user vsftpd from 180.76.142.19 port 44160 ... |
2020-07-28 14:55:35 |
| 212.98.190.52 | attack | Jul 28 06:35:24 jumpserver sshd[278931]: Invalid user impala from 212.98.190.52 port 59886 Jul 28 06:35:26 jumpserver sshd[278931]: Failed password for invalid user impala from 212.98.190.52 port 59886 ssh2 Jul 28 06:38:38 jumpserver sshd[279031]: Invalid user ghazih from 212.98.190.52 port 55400 ... |
2020-07-28 15:19:56 |
| 138.68.237.12 | attackspambots | 2020-07-28T06:28:54.537942shield sshd\[30499\]: Invalid user clusterhack from 138.68.237.12 port 39952 2020-07-28T06:28:54.547104shield sshd\[30499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsddos1.preview-wsd.com 2020-07-28T06:28:56.861022shield sshd\[30499\]: Failed password for invalid user clusterhack from 138.68.237.12 port 39952 ssh2 2020-07-28T06:32:58.975959shield sshd\[31863\]: Invalid user pranava from 138.68.237.12 port 53308 2020-07-28T06:32:58.985349shield sshd\[31863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wsddos1.preview-wsd.com |
2020-07-28 14:40:17 |
| 206.81.12.141 | attackbots | Jul 28 07:55:49 marvibiene sshd[12271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.12.141 Jul 28 07:55:51 marvibiene sshd[12271]: Failed password for invalid user hyh from 206.81.12.141 port 54162 ssh2 |
2020-07-28 14:57:59 |
| 222.82.253.106 | attackspambots | Jul 28 05:54:45 db sshd[2017]: Invalid user lakshmis from 222.82.253.106 port 55690 ... |
2020-07-28 14:56:40 |