City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.199.45.83 | attack | Oct 12 17:30:43 minden010 sshd[13193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 Oct 12 17:30:45 minden010 sshd[13193]: Failed password for invalid user celina from 139.199.45.83 port 45008 ssh2 Oct 12 17:35:20 minden010 sshd[14132]: Failed password for root from 139.199.45.83 port 39056 ssh2 ... |
2020-10-13 04:07:27 |
| 139.199.45.83 | attack | $f2bV_matches |
2020-10-12 19:44:20 |
| 139.199.45.83 | attack | (sshd) Failed SSH login from 139.199.45.83 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 09:32:37 server4 sshd[28535]: Invalid user office from 139.199.45.83 Sep 24 09:32:37 server4 sshd[28535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 Sep 24 09:32:39 server4 sshd[28535]: Failed password for invalid user office from 139.199.45.83 port 56518 ssh2 Sep 24 09:41:23 server4 sshd[1121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 user=root Sep 24 09:41:25 server4 sshd[1121]: Failed password for root from 139.199.45.83 port 50346 ssh2 |
2020-09-24 23:46:16 |
| 139.199.45.83 | attackspam | Invalid user test from 139.199.45.83 port 43226 |
2020-09-24 15:32:43 |
| 139.199.45.83 | attackspambots | (sshd) Failed SSH login from 139.199.45.83 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 15:37:10 server5 sshd[20109]: Invalid user apps from 139.199.45.83 Sep 23 15:37:10 server5 sshd[20109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 Sep 23 15:37:12 server5 sshd[20109]: Failed password for invalid user apps from 139.199.45.83 port 51344 ssh2 Sep 23 15:49:28 server5 sshd[25497]: Invalid user ts3user from 139.199.45.83 Sep 23 15:49:28 server5 sshd[25497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 |
2020-09-24 06:58:39 |
| 139.199.45.83 | attack | Aug 30 17:22:52 h2646465 sshd[22610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 user=root Aug 30 17:22:54 h2646465 sshd[22610]: Failed password for root from 139.199.45.83 port 40330 ssh2 Aug 30 17:49:21 h2646465 sshd[25856]: Invalid user hosts from 139.199.45.83 Aug 30 17:49:21 h2646465 sshd[25856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 Aug 30 17:49:21 h2646465 sshd[25856]: Invalid user hosts from 139.199.45.83 Aug 30 17:49:23 h2646465 sshd[25856]: Failed password for invalid user hosts from 139.199.45.83 port 45484 ssh2 Aug 30 17:53:23 h2646465 sshd[26459]: Invalid user user1 from 139.199.45.83 Aug 30 17:53:23 h2646465 sshd[26459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 Aug 30 17:53:23 h2646465 sshd[26459]: Invalid user user1 from 139.199.45.83 Aug 30 17:53:25 h2646465 sshd[26459]: Failed password for invalid user user1 fr |
2020-08-31 00:25:06 |
| 139.199.45.83 | attackbotsspam | Invalid user big from 139.199.45.83 port 52174 |
2020-08-19 13:01:32 |
| 139.199.45.83 | attack | Aug 12 08:06:13 cosmoit sshd[9920]: Failed password for root from 139.199.45.83 port 55750 ssh2 |
2020-08-12 14:12:20 |
| 139.199.45.83 | attack | Aug 5 23:14:00 dignus sshd[29884]: Failed password for root from 139.199.45.83 port 40906 ssh2 Aug 5 23:15:51 dignus sshd[30126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 user=root Aug 5 23:15:52 dignus sshd[30126]: Failed password for root from 139.199.45.83 port 59928 ssh2 Aug 5 23:17:32 dignus sshd[30351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 user=root Aug 5 23:17:34 dignus sshd[30351]: Failed password for root from 139.199.45.83 port 50740 ssh2 ... |
2020-08-06 14:20:32 |
| 139.199.45.83 | attack | Aug 2 19:00:49 ns382633 sshd\[24403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 user=root Aug 2 19:00:51 ns382633 sshd\[24403\]: Failed password for root from 139.199.45.83 port 35718 ssh2 Aug 2 19:14:46 ns382633 sshd\[27434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 user=root Aug 2 19:14:48 ns382633 sshd\[27434\]: Failed password for root from 139.199.45.83 port 39696 ssh2 Aug 2 19:19:35 ns382633 sshd\[28325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 user=root |
2020-08-03 03:08:15 |
| 139.199.45.83 | attackbots | Jul 29 07:57:56 * sshd[27400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 Jul 29 07:57:58 * sshd[27400]: Failed password for invalid user shifeng from 139.199.45.83 port 37558 ssh2 |
2020-07-29 17:43:26 |
| 139.199.45.83 | attack | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-07-28 16:58:54 |
| 139.199.45.83 | attack | Invalid user qxl from 139.199.45.83 port 34370 |
2020-07-25 13:01:03 |
| 139.199.45.83 | attackbots | Jul 17 14:33:44 ns382633 sshd\[5772\]: Invalid user tm from 139.199.45.83 port 54098 Jul 17 14:33:44 ns382633 sshd\[5772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 Jul 17 14:33:46 ns382633 sshd\[5772\]: Failed password for invalid user tm from 139.199.45.83 port 54098 ssh2 Jul 17 14:47:27 ns382633 sshd\[8401\]: Invalid user alibaba from 139.199.45.83 port 59346 Jul 17 14:47:27 ns382633 sshd\[8401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83 |
2020-07-18 00:10:19 |
| 139.199.45.83 | attackbotsspam | $f2bV_matches |
2020-07-17 01:00:13 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.199.45.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30738
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.199.45.76. IN A
;; AUTHORITY SECTION:
. 104 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024060800 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 08 23:55:18 CST 2024
;; MSG SIZE rcvd: 106
Host 76.45.199.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 76.45.199.139.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 116.232.8.170 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-28 14:12:32 |
| 148.72.42.181 | attackbotsspam | Automatic report - Banned IP Access |
2020-02-28 14:23:14 |
| 180.250.76.124 | attack | Honeypot attack, port: 445, PTR: 124.subnet180-250-76.Astinet.telkom.net.id. |
2020-02-28 14:19:40 |
| 190.151.105.182 | attackbotsspam | Feb 28 06:57:12 localhost sshd\[6555\]: Invalid user appadmin from 190.151.105.182 port 40786 Feb 28 06:57:12 localhost sshd\[6555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.151.105.182 Feb 28 06:57:13 localhost sshd\[6555\]: Failed password for invalid user appadmin from 190.151.105.182 port 40786 ssh2 |
2020-02-28 13:59:01 |
| 93.113.111.100 | attackbots | Automatic report - Banned IP Access |
2020-02-28 14:10:08 |
| 222.186.15.91 | attack | Feb 28 01:17:50 plusreed sshd[18798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.91 user=root Feb 28 01:17:51 plusreed sshd[18798]: Failed password for root from 222.186.15.91 port 36321 ssh2 ... |
2020-02-28 14:22:11 |
| 1.179.165.213 | attackspam | 1582865762 - 02/28/2020 05:56:02 Host: 1.179.165.213/1.179.165.213 Port: 445 TCP Blocked |
2020-02-28 14:14:20 |
| 61.55.135.108 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-28 14:10:53 |
| 103.84.69.200 | attack | Automatic report - Port Scan Attack |
2020-02-28 14:06:13 |
| 97.121.167.110 | attackbots | Automatic report - Port Scan Attack |
2020-02-28 13:46:21 |
| 49.88.112.113 | attackbotsspam | Feb 28 02:56:04 firewall sshd[20593]: Failed password for root from 49.88.112.113 port 27962 ssh2 Feb 28 02:56:07 firewall sshd[20593]: Failed password for root from 49.88.112.113 port 27962 ssh2 Feb 28 02:56:09 firewall sshd[20593]: Failed password for root from 49.88.112.113 port 27962 ssh2 ... |
2020-02-28 14:25:58 |
| 13.127.177.48 | attackspam | 13.127.177.48 - - [28/Feb/2020:07:56:38 +0300] "POST /wp-login.php HTTP/1.1" 200 2790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-02-28 13:42:56 |
| 202.138.248.85 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-28 14:03:52 |
| 122.51.71.197 | attack | Feb 28 06:26:05 mout sshd[22633]: Invalid user deploy from 122.51.71.197 port 59928 |
2020-02-28 13:53:29 |
| 223.16.232.54 | attack | Honeypot attack, port: 5555, PTR: 54-232-16-223-on-nets.com. |
2020-02-28 13:55:34 |