City: Jakarta
Region: Jakarta
Country: Indonesia
Internet Service Provider: PT Telkom Indonesia
Hostname: unknown
Organization: unknown
Usage Type: unknown
Type | Details | Datetime |
---|---|---|
attackbots | Automatic report - Port Scan Attack |
2020-08-21 18:54:25 |
attack | Unauthorised access (Dec 2) SRC=125.161.129.54 LEN=52 TTL=116 ID=26537 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-03 02:59:13 |
IP | Type | Details | Datetime |
---|---|---|---|
125.161.129.130 | attackspam | Invalid user jupiter from 125.161.129.130 port 23218 |
2020-05-30 19:43:10 |
125.161.129.239 | attack | May 24 22:31:00 andromeda sshd\[30481\]: Invalid user 666666 from 125.161.129.239 port 3422 May 24 22:31:01 andromeda sshd\[30481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.161.129.239 May 24 22:31:01 andromeda sshd\[30490\]: Invalid user 666666 from 125.161.129.239 port 45030 |
2020-05-25 05:47:03 |
125.161.129.186 | attack | SSH invalid-user multiple login attempts |
2020-05-13 18:48:59 |
125.161.129.247 | attackbots | Unauthorized connection attempt from IP address 125.161.129.247 on Port 445(SMB) |
2020-05-06 00:54:15 |
125.161.129.133 | attackbotsspam | Repeated RDP login failures. Last user: Administrator |
2020-04-02 12:51:01 |
125.161.129.101 | attackspam | SMB Server BruteForce Attack |
2020-03-27 13:19:52 |
125.161.129.197 | attack | Honeypot attack, port: 445, PTR: 197.subnet125-161-129.speedy.telkom.net.id. |
2020-02-19 14:48:34 |
125.161.129.47 | attack | SSH brutforce |
2020-02-10 21:05:44 |
125.161.129.211 | attack | DATE:2020-02-02 16:08:05, IP:125.161.129.211, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2020-02-03 02:44:31 |
125.161.129.213 | attack | unauthorized connection attempt |
2020-01-28 19:23:46 |
125.161.129.72 | attack | Honeypot attack, port: 445, PTR: 72.subnet125-161-129.speedy.telkom.net.id. |
2019-10-21 14:06:14 |
125.161.129.22 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 14-10-2019 04:45:16. |
2019-10-14 19:43:41 |
125.161.129.216 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 08-10-2019 04:55:19. |
2019-10-08 15:36:25 |
125.161.129.235 | attackspam | Caught in portsentry honeypot |
2019-08-10 12:50:14 |
125.161.129.236 | attack | [Aegis] @ 2019-07-31 09:06:59 0100 -> SSH insecure connection attempt (scan). |
2019-07-31 19:44:36 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.161.129.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.161.129.54. IN A
;; AUTHORITY SECTION:
. 378 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019120201 1800 900 604800 86400
;; Query time: 133 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 03 02:59:10 CST 2019
;; MSG SIZE rcvd: 118
54.129.161.125.in-addr.arpa domain name pointer 54.subnet125-161-129.speedy.telkom.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.129.161.125.in-addr.arpa name = 54.subnet125-161-129.speedy.telkom.net.id.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
180.66.207.67 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-04-02 04:32:14 |
14.186.187.165 | attack | 20/4/1@08:26:53: FAIL: Alarm-Network address from=14.186.187.165 ... |
2020-04-02 05:06:18 |
189.190.26.9 | attack | Apr 1 18:19:18 work-partkepr sshd\[17427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.190.26.9 user=root Apr 1 18:19:20 work-partkepr sshd\[17427\]: Failed password for root from 189.190.26.9 port 28028 ssh2 ... |
2020-04-02 04:48:44 |
117.50.38.246 | attackbotsspam | Apr 1 22:09:25 Ubuntu-1404-trusty-64-minimal sshd\[24397\]: Invalid user user9 from 117.50.38.246 Apr 1 22:09:25 Ubuntu-1404-trusty-64-minimal sshd\[24397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.246 Apr 1 22:09:27 Ubuntu-1404-trusty-64-minimal sshd\[24397\]: Failed password for invalid user user9 from 117.50.38.246 port 42724 ssh2 Apr 1 22:15:51 Ubuntu-1404-trusty-64-minimal sshd\[28401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.246 user=root Apr 1 22:15:52 Ubuntu-1404-trusty-64-minimal sshd\[28401\]: Failed password for root from 117.50.38.246 port 47800 ssh2 |
2020-04-02 05:00:17 |
149.28.250.73 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-04-02 04:57:09 |
177.130.241.0 | attackspambots | Automatic report - Port Scan |
2020-04-02 05:05:26 |
120.71.147.93 | attackbots | Apr 1 15:45:04 icinga sshd[46344]: Failed password for root from 120.71.147.93 port 51666 ssh2 Apr 1 15:49:50 icinga sshd[53926]: Failed password for root from 120.71.147.93 port 43872 ssh2 ... |
2020-04-02 04:52:47 |
159.65.35.14 | attackspam | Apr 1 12:23:36 game-panel sshd[15152]: Failed password for root from 159.65.35.14 port 53412 ssh2 Apr 1 12:27:39 game-panel sshd[15324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.35.14 Apr 1 12:27:41 game-panel sshd[15324]: Failed password for invalid user nivinform from 159.65.35.14 port 36628 ssh2 |
2020-04-02 04:35:12 |
88.32.154.37 | attackspambots | Apr 1 22:33:58 minden010 sshd[15045]: Failed password for root from 88.32.154.37 port 41735 ssh2 Apr 1 22:37:51 minden010 sshd[16342]: Failed password for root from 88.32.154.37 port 47869 ssh2 ... |
2020-04-02 05:03:53 |
173.252.87.45 | attackbotsspam | [Wed Apr 01 19:51:15.867889 2020] [:error] [pid 13155:tid 140357682616064] [client 173.252.87.45:63876] [client 173.252.87.45] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/favicon-32-32.png"] [unique_id "XoSOQ-EBhu3WEjTmXz-VmAAAAAE"] ... |
2020-04-02 04:38:25 |
197.43.136.183 | attackspambots | DATE:2020-04-01 14:26:46, IP:197.43.136.183, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-04-02 05:10:18 |
51.91.212.81 | attackspam | Port 443 (HTTPS) access denied |
2020-04-02 04:52:32 |
106.12.106.42 | attackbots | Unauthorized SSH login attempts |
2020-04-02 05:01:57 |
182.61.40.158 | attackspam | SSH brute force attempt |
2020-04-02 05:01:06 |
23.80.97.160 | attack | (From wordpresswizardwes@yahoo.com) Hi there, I came across your website yesterday and ran into some missed opportunities I think you’ll want to take a look at! I own a digital marketing company in Kingston Ontario, and can already see several minor improvements that would be solved by a basic website management package. Although cheap, this can significantly improve your online presence and outreach. I know you’re probably very busy, but if you would like to learn more I'd be happy to send you a link with all the details. I look forward to your response, Wes |
2020-04-02 04:51:04 |