City: Singapore
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.180.142.5 | attack | Unauthorized connection attempt detected from IP address 139.180.142.5 to port 445 [T] |
2020-07-22 01:09:30 |
| 139.180.142.152 | attackspambots | 2019-07-25T08:00:21.580792abusebot-6.cloudsearch.cf sshd\[14092\]: Invalid user Tech\$123 from 139.180.142.152 port 55358 |
2019-07-25 18:34:42 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.142.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52734
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.180.142.125. IN A
;; AUTHORITY SECTION:
. 479 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 128 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:12:12 CST 2022
;; MSG SIZE rcvd: 108
125.142.180.139.in-addr.arpa domain name pointer 139.180.142.125.vultr.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
125.142.180.139.in-addr.arpa name = 139.180.142.125.vultr.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.33.119.67 | attackspam | Aug 9 01:31:49 root sshd[20847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.119.67 Aug 9 01:31:51 root sshd[20847]: Failed password for invalid user gao from 41.33.119.67 port 24038 ssh2 Aug 9 01:37:33 root sshd[20876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.119.67 ... |
2019-08-09 07:44:41 |
| 196.52.43.101 | attack | scan z |
2019-08-09 07:34:36 |
| 51.15.50.79 | attackbotsspam | Aug 9 01:39:51 OPSO sshd\[22855\]: Invalid user miura from 51.15.50.79 port 59488 Aug 9 01:39:51 OPSO sshd\[22855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.50.79 Aug 9 01:39:53 OPSO sshd\[22855\]: Failed password for invalid user miura from 51.15.50.79 port 59488 ssh2 Aug 9 01:44:22 OPSO sshd\[23302\]: Invalid user sowmya from 51.15.50.79 port 53914 Aug 9 01:44:22 OPSO sshd\[23302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.50.79 |
2019-08-09 07:53:16 |
| 77.247.110.22 | attackbotsspam | 08/08/2019-18:46:35.498635 77.247.110.22 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 75 |
2019-08-09 07:41:13 |
| 5.101.205.14 | attackspam | [portscan] Port scan |
2019-08-09 07:39:25 |
| 89.111.33.22 | attackspam | fire |
2019-08-09 08:09:35 |
| 120.29.152.218 | attackbotsspam | Aug 8 21:53:34 system,error,critical: login failure for user admin from 120.29.152.218 via telnet Aug 8 21:53:35 system,error,critical: login failure for user root from 120.29.152.218 via telnet Aug 8 21:53:36 system,error,critical: login failure for user root from 120.29.152.218 via telnet Aug 8 21:53:37 system,error,critical: login failure for user root from 120.29.152.218 via telnet Aug 8 21:53:38 system,error,critical: login failure for user admin from 120.29.152.218 via telnet Aug 8 21:53:40 system,error,critical: login failure for user default from 120.29.152.218 via telnet Aug 8 21:53:41 system,error,critical: login failure for user guest from 120.29.152.218 via telnet Aug 8 21:53:42 system,error,critical: login failure for user admin from 120.29.152.218 via telnet Aug 8 21:53:43 system,error,critical: login failure for user root from 120.29.152.218 via telnet Aug 8 21:53:44 system,error,critical: login failure for user root from 120.29.152.218 via telnet |
2019-08-09 07:48:32 |
| 119.226.66.66 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:54:46,907 INFO [amun_request_handler] PortScan Detected on Port: 445 (119.226.66.66)22) |
2019-08-09 07:52:17 |
| 59.100.246.170 | attackspam | Aug 8 21:54:01 MK-Soft-VM3 sshd\[5630\]: Invalid user nagios from 59.100.246.170 port 39067 Aug 8 21:54:01 MK-Soft-VM3 sshd\[5630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.100.246.170 Aug 8 21:54:02 MK-Soft-VM3 sshd\[5630\]: Failed password for invalid user nagios from 59.100.246.170 port 39067 ssh2 ... |
2019-08-09 07:43:23 |
| 176.101.252.62 | attackbots | Automatic report - Port Scan Attack |
2019-08-09 07:52:52 |
| 49.88.112.77 | attackbots | Aug 8 22:54:23 ip-172-31-62-245 sshd\[23039\]: Failed password for root from 49.88.112.77 port 42124 ssh2\ Aug 8 22:54:39 ip-172-31-62-245 sshd\[23041\]: Failed password for root from 49.88.112.77 port 28540 ssh2\ Aug 8 22:54:54 ip-172-31-62-245 sshd\[23045\]: Failed password for root from 49.88.112.77 port 13966 ssh2\ Aug 8 22:55:09 ip-172-31-62-245 sshd\[23052\]: Failed password for root from 49.88.112.77 port 53585 ssh2\ Aug 8 22:55:25 ip-172-31-62-245 sshd\[23054\]: Failed password for root from 49.88.112.77 port 41067 ssh2\ |
2019-08-09 07:42:02 |
| 60.248.219.185 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 21:35:36,198 INFO [amun_request_handler] PortScan Detected on Port: 445 (60.248.219.185) |
2019-08-09 07:46:17 |
| 99.79.75.144 | attack | fire |
2019-08-09 07:58:02 |
| 61.164.96.154 | attackbots | 08/08/2019-17:53:21.295560 61.164.96.154 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 62 |
2019-08-09 07:58:25 |
| 89.197.161.164 | attack | fire |
2019-08-09 08:07:25 |