City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 13.66.139.0 | attackbots | log:/aero/meteo/UGEJ |
2020-08-04 18:11:00 |
| 13.66.139.0 | attackspambots | log:/meteo/biarritz_FR |
2020-08-04 12:12:26 |
| 13.66.139.0 | attackbotsspam | Automatic report - Banned IP Access |
2020-06-18 18:33:16 |
| 13.66.139.0 | attackbots | SQL injection attempt. |
2020-03-26 01:53:48 |
| 13.66.139.0 | attack | Automatic report - Banned IP Access |
2020-02-08 20:47:57 |
| 13.66.139.0 | attackbotsspam | Automatic report - Banned IP Access |
2019-12-30 13:54:52 |
| 13.66.139.1 | attackspam | Scanning unused Default website or suspicious access to valid sites from IP marked as abusive |
2019-12-12 08:49:37 |
| 13.66.139.0 | attackbotsspam | Port Scan: TCP/443 |
2019-10-18 16:42:50 |
| 13.66.139.1 | attack | Brute force attack stopped by firewall |
2019-09-25 08:59:37 |
| 13.66.139.0 | attackbots | Port Scan: TCP/443 |
2019-09-20 23:10:20 |
| 13.66.139.1 | attackspambots | Port Scan: TCP/443 |
2019-09-10 18:54:04 |
| 13.66.139.0 | attackspambots | Port Scan: TCP/443 |
2019-09-03 03:27:03 |
| 13.66.139.0 | attackspambots | Port Scan: TCP/443 |
2019-08-05 12:49:42 |
| 13.66.139.1 | attack | Port Scan: TCP/80 |
2019-08-05 11:45:03 |
| 13.66.139.1 | attackspambots | Brute force attack stopped by firewall |
2019-07-05 10:11:11 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.66.139.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.66.139.70. IN A
;; AUTHORITY SECTION:
. 120 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:13:03 CST 2022
;; MSG SIZE rcvd: 105
70.139.66.13.in-addr.arpa domain name pointer msnbot-13-66-139-70.search.msn.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
70.139.66.13.in-addr.arpa name = msnbot-13-66-139-70.search.msn.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.89.173.198 | attackbots | firewall-block, port(s): 8444/tcp |
2020-02-10 01:51:15 |
| 179.184.8.142 | attackbots | 5x Failed Password |
2020-02-10 02:05:53 |
| 106.12.49.150 | attackbotsspam | Feb 9 04:58:44 hpm sshd\[24521\]: Invalid user hol from 106.12.49.150 Feb 9 04:58:44 hpm sshd\[24521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.150 Feb 9 04:58:46 hpm sshd\[24521\]: Failed password for invalid user hol from 106.12.49.150 port 54468 ssh2 Feb 9 05:03:03 hpm sshd\[25013\]: Invalid user had from 106.12.49.150 Feb 9 05:03:03 hpm sshd\[25013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.150 |
2020-02-10 01:56:23 |
| 162.243.42.225 | attackspam | 2020-02-09T10:56:33.079808-07:00 suse-nuc sshd[21696]: Invalid user htf from 162.243.42.225 port 46818 ... |
2020-02-10 02:19:10 |
| 36.67.235.11 | attack | Unauthorized connection attempt from IP address 36.67.235.11 on Port 445(SMB) |
2020-02-10 02:21:15 |
| 1.175.211.50 | attackspam | Telnet/23 MH Probe, BF, Hack - |
2020-02-10 02:17:26 |
| 36.234.207.195 | attack | Telnet Server BruteForce Attack |
2020-02-10 01:48:01 |
| 144.121.28.206 | attack | Feb 9 14:24:34 PAR-161229 sshd[35227]: Failed password for invalid user ysx from 144.121.28.206 port 45378 ssh2 Feb 9 14:30:31 PAR-161229 sshd[35376]: Failed password for invalid user jef from 144.121.28.206 port 25294 ssh2 Feb 9 14:33:38 PAR-161229 sshd[35507]: Failed password for invalid user nqg from 144.121.28.206 port 53830 ssh2 |
2020-02-10 01:50:25 |
| 14.162.239.100 | attackspam | Unauthorized connection attempt from IP address 14.162.239.100 on Port 445(SMB) |
2020-02-10 01:56:52 |
| 154.242.223.0 | attackspam | Unauthorized connection attempt from IP address 154.242.223.0 on Port 445(SMB) |
2020-02-10 01:46:51 |
| 84.39.191.18 | attack | Feb 9 14:32:59 debian-2gb-nbg1-2 kernel: \[3514416.360770\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=84.39.191.18 DST=195.201.40.59 LEN=46 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=UDP SPT=5605 DPT=1900 LEN=26 |
2020-02-10 02:20:44 |
| 181.123.177.204 | attackbotsspam | Feb 9 19:47:06 lukav-desktop sshd\[10311\]: Invalid user uzy from 181.123.177.204 Feb 9 19:47:06 lukav-desktop sshd\[10311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.177.204 Feb 9 19:47:08 lukav-desktop sshd\[10311\]: Failed password for invalid user uzy from 181.123.177.204 port 53348 ssh2 Feb 9 19:50:16 lukav-desktop sshd\[10328\]: Invalid user dsn from 181.123.177.204 Feb 9 19:50:16 lukav-desktop sshd\[10328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.177.204 |
2020-02-10 02:14:44 |
| 200.105.229.170 | attack | Unauthorized connection attempt detected from IP address 200.105.229.170 to port 445 |
2020-02-10 01:57:21 |
| 185.176.27.254 | attackbots | 02/09/2020-13:09:33.008072 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-10 02:10:24 |
| 176.59.14.112 | attack | Unauthorized connection attempt from IP address 176.59.14.112 on Port 445(SMB) |
2020-02-10 01:50:05 |