City: unknown
Region: Washington
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
13.66.139.0 | attackbots | log:/aero/meteo/UGEJ |
2020-08-04 18:11:00 |
13.66.139.0 | attackspambots | log:/meteo/biarritz_FR |
2020-08-04 12:12:26 |
13.66.139.0 | attackbotsspam | Automatic report - Banned IP Access |
2020-06-18 18:33:16 |
13.66.139.0 | attackbots | SQL injection attempt. |
2020-03-26 01:53:48 |
13.66.139.0 | attack | Automatic report - Banned IP Access |
2020-02-08 20:47:57 |
13.66.139.0 | attackbotsspam | Automatic report - Banned IP Access |
2019-12-30 13:54:52 |
13.66.139.1 | attackspam | Scanning unused Default website or suspicious access to valid sites from IP marked as abusive |
2019-12-12 08:49:37 |
13.66.139.0 | attackbotsspam | Port Scan: TCP/443 |
2019-10-18 16:42:50 |
13.66.139.1 | attack | Brute force attack stopped by firewall |
2019-09-25 08:59:37 |
13.66.139.0 | attackbots | Port Scan: TCP/443 |
2019-09-20 23:10:20 |
13.66.139.1 | attackspambots | Port Scan: TCP/443 |
2019-09-10 18:54:04 |
13.66.139.0 | attackspambots | Port Scan: TCP/443 |
2019-09-03 03:27:03 |
13.66.139.0 | attackspambots | Port Scan: TCP/443 |
2019-08-05 12:49:42 |
13.66.139.1 | attack | Port Scan: TCP/80 |
2019-08-05 11:45:03 |
13.66.139.1 | attackspambots | Brute force attack stopped by firewall |
2019-07-05 10:11:11 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.66.139.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.66.139.66. IN A
;; AUTHORITY SECTION:
. 552 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020120300 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 03 22:33:42 CST 2020
;; MSG SIZE rcvd: 116
66.139.66.13.in-addr.arpa domain name pointer msnbot-13-66-139-66.search.msn.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.139.66.13.in-addr.arpa name = msnbot-13-66-139-66.search.msn.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
36.80.188.176 | attack | 1602276262 - 10/09/2020 22:44:22 Host: 36.80.188.176/36.80.188.176 Port: 445 TCP Blocked |
2020-10-10 20:32:17 |
162.142.125.46 | attackbotsspam | Oct 9 23:44:33 baraca inetd[34221]: refused connection from scanner-04.ch1.censys-scanner.com, service sshd (tcp) Oct 9 23:44:35 baraca inetd[34222]: refused connection from scanner-04.ch1.censys-scanner.com, service sshd (tcp) Oct 9 23:44:36 baraca inetd[34225]: refused connection from scanner-04.ch1.censys-scanner.com, service sshd (tcp) ... |
2020-10-10 20:04:08 |
45.14.150.51 | attack | (sshd) Failed SSH login from 45.14.150.51 (RO/Romania/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 10 08:12:10 server4 sshd[27424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.51 user=nobody Oct 10 08:12:12 server4 sshd[27424]: Failed password for nobody from 45.14.150.51 port 59558 ssh2 Oct 10 08:29:52 server4 sshd[10555]: Invalid user majordomo5 from 45.14.150.51 Oct 10 08:29:52 server4 sshd[10555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.51 Oct 10 08:29:54 server4 sshd[10555]: Failed password for invalid user majordomo5 from 45.14.150.51 port 56344 ssh2 |
2020-10-10 20:35:58 |
162.142.125.45 | attackspam | Oct 9 23:44:33 baraca inetd[34221]: refused connection from scanner-04.ch1.censys-scanner.com, service sshd (tcp) Oct 9 23:44:35 baraca inetd[34222]: refused connection from scanner-04.ch1.censys-scanner.com, service sshd (tcp) Oct 9 23:44:36 baraca inetd[34225]: refused connection from scanner-04.ch1.censys-scanner.com, service sshd (tcp) ... |
2020-10-10 19:58:09 |
162.158.92.24 | attackbotsspam | srv02 DDoS Malware Target(80:http) .. |
2020-10-10 20:21:58 |
175.24.105.133 | attackspam | SSH login attempts. |
2020-10-10 20:35:16 |
162.243.175.41 | attack | s2.hscode.pl - SSH Attack |
2020-10-10 20:27:15 |
5.160.84.178 | attackspambots | 1602276269 - 10/09/2020 22:44:29 Host: 5.160.84.178/5.160.84.178 Port: 445 TCP Blocked ... |
2020-10-10 20:22:54 |
121.178.197.109 | attackbots | On BarracudaCentral for sending spam / proto=17 . srcport=8000 . dstport=5353 . (654) |
2020-10-10 20:23:26 |
182.61.175.219 | attackbots | Invalid user smbguest from 182.61.175.219 port 47558 |
2020-10-10 19:57:50 |
51.75.249.224 | attackspam | 5x Failed Password |
2020-10-10 20:15:11 |
62.122.156.74 | attackspam | Invalid user irc from 62.122.156.74 port 53938 |
2020-10-10 20:09:29 |
81.133.142.45 | attackbots | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-10-10 20:14:48 |
118.89.241.214 | attackbots | Oct 10 14:19:16 ns37 sshd[27394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.241.214 |
2020-10-10 20:23:47 |
182.61.40.214 | attackbots | Fail2Ban Ban Triggered (2) |
2020-10-10 20:15:39 |