Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: V6Yun (Beijing) Network Co. Ltd

Hostname: unknown

Organization: unknown

Usage Type: Search Engine Spider

Comments:
Type Details Datetime
attack
(sshd) Failed SSH login from 139.199.74.11 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 21:21:30 server5 sshd[20350]: Invalid user user from 139.199.74.11
Sep 24 21:21:30 server5 sshd[20350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.11 
Sep 24 21:21:32 server5 sshd[20350]: Failed password for invalid user user from 139.199.74.11 port 47070 ssh2
Sep 24 21:28:26 server5 sshd[23046]: Invalid user admin from 139.199.74.11
Sep 24 21:28:26 server5 sshd[23046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.11
2020-09-25 10:45:46
attack
Time:     Sun Aug 30 16:38:49 2020 +0000
IP:       139.199.74.11 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 30 16:23:25 vps1 sshd[23619]: Invalid user inst01 from 139.199.74.11 port 44520
Aug 30 16:23:27 vps1 sshd[23619]: Failed password for invalid user inst01 from 139.199.74.11 port 44520 ssh2
Aug 30 16:33:45 vps1 sshd[24081]: Invalid user camera from 139.199.74.11 port 52540
Aug 30 16:33:47 vps1 sshd[24081]: Failed password for invalid user camera from 139.199.74.11 port 52540 ssh2
Aug 30 16:38:47 vps1 sshd[24341]: Invalid user ali from 139.199.74.11 port 43938
2020-08-31 03:58:15
attack
Aug 28 16:34:43 marvibiene sshd[24328]: Failed password for root from 139.199.74.11 port 51240 ssh2
Aug 28 16:40:07 marvibiene sshd[24710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.11 
Aug 28 16:40:09 marvibiene sshd[24710]: Failed password for invalid user user1 from 139.199.74.11 port 51454 ssh2
2020-08-29 00:10:40
attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-07-11 08:24:43
attackbotsspam
Jun 22 15:45:01 askasleikir sshd[31008]: Failed password for invalid user uap from 139.199.74.11 port 43822 ssh2
Jun 22 15:30:59 askasleikir sshd[30980]: Failed password for invalid user deploy from 139.199.74.11 port 34264 ssh2
Jun 22 15:36:23 askasleikir sshd[30990]: Failed password for invalid user julian from 139.199.74.11 port 34260 ssh2
2020-06-23 06:15:35
attackspambots
$f2bV_matches
2020-06-06 05:19:21
attack
May 19 10:15:33 our-server-hostname sshd[29912]: Invalid user tyf from 139.199.74.11
May 19 10:15:33 our-server-hostname sshd[29912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.11 
May 19 10:15:35 our-server-hostname sshd[29912]: Failed password for invalid user tyf from 139.199.74.11 port 58740 ssh2
May 19 11:05:36 our-server-hostname sshd[8343]: Invalid user ofl from 139.199.74.11
May 19 11:05:36 our-server-hostname sshd[8343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.11 
May 19 11:05:38 our-server-hostname sshd[8343]: Failed password for invalid user ofl from 139.199.74.11 port 33438 ssh2
May 19 11:39:40 our-server-hostname sshd[14037]: Invalid user jmw from 139.199.74.11
May 19 11:39:40 our-server-hostname sshd[14037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.11 
May 19 11:39:42 our-server-hostnam........
-------------------------------
2020-05-20 21:52:17
Comments on same subnet:
IP Type Details Datetime
139.199.74.92 attack
Failed password for invalid user reshma from 139.199.74.92 port 48496 ssh2
2020-08-25 12:39:58
139.199.74.92 attackbotsspam
Port Scan
...
2020-08-15 00:41:51
139.199.74.92 attackbotsspam
Jun 16 13:04:42 onepixel sshd[1382520]: Invalid user luke from 139.199.74.92 port 34546
Jun 16 13:04:42 onepixel sshd[1382520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.92 
Jun 16 13:04:42 onepixel sshd[1382520]: Invalid user luke from 139.199.74.92 port 34546
Jun 16 13:04:44 onepixel sshd[1382520]: Failed password for invalid user luke from 139.199.74.92 port 34546 ssh2
Jun 16 13:09:00 onepixel sshd[1383662]: Invalid user adva from 139.199.74.92 port 53462
2020-06-16 22:10:49
139.199.74.92 attack
$f2bV_matches
2020-05-14 18:49:19
139.199.74.92 attack
Unauthorized SSH login attempts
2020-05-06 05:51:43
139.199.74.92 attackspam
Apr 17 06:33:54 host sshd[55731]: Invalid user n from 139.199.74.92 port 52280
...
2020-04-17 14:48:50
139.199.74.92 attack
Apr  3 07:08:00 lock-38 sshd[497495]: Failed password for root from 139.199.74.92 port 53870 ssh2
Apr  3 07:21:06 lock-38 sshd[497918]: Failed password for root from 139.199.74.92 port 55022 ssh2
Apr  3 07:24:15 lock-38 sshd[498005]: Failed password for root from 139.199.74.92 port 57314 ssh2
Apr  3 07:27:06 lock-38 sshd[498087]: Failed password for root from 139.199.74.92 port 59604 ssh2
Apr  3 07:30:01 lock-38 sshd[498138]: Failed password for root from 139.199.74.92 port 33662 ssh2
...
2020-04-03 18:54:23
139.199.74.92 attackbots
Apr  1 09:43:01 gw1 sshd[27603]: Failed password for root from 139.199.74.92 port 33186 ssh2
...
2020-04-01 14:50:23
139.199.74.166 attackspam
ThinkPHP Remote Command Execution Vulnerability, PTR: PTR record not found
2020-03-31 06:15:58
139.199.74.92 attackspambots
leo_www
2020-03-30 08:44:13
139.199.74.92 attack
Mar 13 10:49:56 webhost01 sshd[25128]: Failed password for root from 139.199.74.92 port 41212 ssh2
...
2020-03-13 16:51:34
139.199.74.92 attackspam
2020-03-11T11:41:32.834576v22018076590370373 sshd[14727]: Failed password for root from 139.199.74.92 port 41220 ssh2
2020-03-11T11:44:53.840696v22018076590370373 sshd[2808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.92  user=root
2020-03-11T11:44:56.422942v22018076590370373 sshd[2808]: Failed password for root from 139.199.74.92 port 51854 ssh2
2020-03-11T11:46:36.841798v22018076590370373 sshd[20761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.92  user=root
2020-03-11T11:46:38.896921v22018076590370373 sshd[20761]: Failed password for root from 139.199.74.92 port 43054 ssh2
...
2020-03-11 23:09:21
139.199.74.92 attackspam
3x Failed Password
2020-03-06 09:05:58
139.199.74.92 attackspam
Mar  4 01:03:31 hpm sshd\[20457\]: Invalid user rstudio from 139.199.74.92
Mar  4 01:03:31 hpm sshd\[20457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.92
Mar  4 01:03:32 hpm sshd\[20457\]: Failed password for invalid user rstudio from 139.199.74.92 port 55984 ssh2
Mar  4 01:11:05 hpm sshd\[21224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.92  user=backup
Mar  4 01:11:06 hpm sshd\[21224\]: Failed password for backup from 139.199.74.92 port 56766 ssh2
2020-03-04 20:20:58
139.199.74.166 attackbots
abuseConfidenceScore blocked for 12h
2020-02-05 06:31:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.199.74.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26025
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.199.74.11.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020052000 1800 900 604800 86400

;; Query time: 199 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 20 21:52:13 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 11.74.199.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.74.199.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.75.23.214 attack
51.75.23.214 - - [26/Sep/2020:13:36:55 +0100] "POST /wp-login.php HTTP/1.1" 200 2760 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.23.214 - - [26/Sep/2020:13:36:56 +0100] "POST /wp-login.php HTTP/1.1" 200 2822 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.23.214 - - [26/Sep/2020:13:36:56 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-26 23:49:31
118.188.20.5 attackbotsspam
2020-09-26 07:28:28.625038-0500  localhost sshd[33666]: Failed password for invalid user liu from 118.188.20.5 port 51588 ssh2
2020-09-26 23:31:33
13.85.72.71 attack
2020-09-26 10:03:49.796396-0500  localhost sshd[46942]: Failed password for invalid user admin from 13.85.72.71 port 36062 ssh2
2020-09-26 23:40:22
129.28.92.64 attack
Sep 26 03:42:10 propaganda sshd[25287]: Connection from 129.28.92.64 port 44660 on 10.0.0.161 port 22 rdomain ""
Sep 26 03:42:10 propaganda sshd[25287]: Connection closed by 129.28.92.64 port 44660 [preauth]
2020-09-26 23:59:03
52.165.226.15 attackbots
2020-09-26T13:03:26.402746vps773228.ovh.net sshd[27541]: Failed password for invalid user 15.185.55.120 from 52.165.226.15 port 28058 ssh2
2020-09-26T17:13:03.498649vps773228.ovh.net sshd[30447]: Invalid user admin from 52.165.226.15 port 11242
2020-09-26T17:13:03.518375vps773228.ovh.net sshd[30447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.165.226.15
2020-09-26T17:13:03.498649vps773228.ovh.net sshd[30447]: Invalid user admin from 52.165.226.15 port 11242
2020-09-26T17:13:05.802057vps773228.ovh.net sshd[30447]: Failed password for invalid user admin from 52.165.226.15 port 11242 ssh2
...
2020-09-26 23:22:19
139.155.13.81 attack
Sep 26 17:09:11 ns382633 sshd\[29250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.13.81  user=root
Sep 26 17:09:13 ns382633 sshd\[29250\]: Failed password for root from 139.155.13.81 port 53970 ssh2
Sep 26 17:14:30 ns382633 sshd\[30199\]: Invalid user cisco from 139.155.13.81 port 51202
Sep 26 17:14:30 ns382633 sshd\[30199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.13.81
Sep 26 17:14:32 ns382633 sshd\[30199\]: Failed password for invalid user cisco from 139.155.13.81 port 51202 ssh2
2020-09-26 23:47:41
49.232.65.29 attackspambots
Invalid user test from 49.232.65.29 port 59518
2020-09-26 23:33:19
187.188.11.234 attackbotsspam
Invalid user ricardo from 187.188.11.234 port 7508
2020-09-26 23:42:47
165.232.113.222 attackbots
Sep 24 08:49:44 online-web-1 sshd[1881796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.113.222  user=r.r
Sep 24 08:49:46 online-web-1 sshd[1881796]: Failed password for r.r from 165.232.113.222 port 50924 ssh2
Sep 24 08:49:46 online-web-1 sshd[1881796]: Received disconnect from 165.232.113.222 port 50924:11: Bye Bye [preauth]
Sep 24 08:49:46 online-web-1 sshd[1881796]: Disconnected from 165.232.113.222 port 50924 [preauth]
Sep 24 08:57:19 online-web-1 sshd[1883076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.113.222  user=r.r
Sep 24 08:57:21 online-web-1 sshd[1883076]: Failed password for r.r from 165.232.113.222 port 49086 ssh2
Sep 24 08:57:21 online-web-1 sshd[1883076]: Received disconnect from 165.232.113.222 port 49086:11: Bye Bye [preauth]
Sep 24 08:57:21 online-web-1 sshd[1883076]: Disconnected from 165.232.113.222 port 49086 [preauth]
Sep 24 09:01:05 online-w........
-------------------------------
2020-09-26 23:33:42
190.128.118.185 attackbotsspam
Invalid user mehdi from 190.128.118.185 port 49291
2020-09-26 23:29:44
24.165.208.33 attackbotsspam
Automatic report - Banned IP Access
2020-09-26 23:55:53
189.125.93.48 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-26 23:44:31
163.172.34.240 attackbots
5060/udp
[2020-09-25]1pkt
2020-09-26 23:27:16
106.54.140.165 attackbots
Sep 26 18:20:30 site3 sshd\[18302\]: Invalid user gitblit from 106.54.140.165
Sep 26 18:20:30 site3 sshd\[18302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.140.165
Sep 26 18:20:32 site3 sshd\[18302\]: Failed password for invalid user gitblit from 106.54.140.165 port 47232 ssh2
Sep 26 18:25:30 site3 sshd\[18324\]: Invalid user train1 from 106.54.140.165
Sep 26 18:25:30 site3 sshd\[18324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.140.165
...
2020-09-26 23:37:14
178.128.157.71 attackbots
$f2bV_matches
2020-09-26 23:38:36

Recently Reported IPs

36.71.236.77 154.238.185.166 134.246.85.86 201.110.195.167
178.207.126.253 175.136.224.34 171.236.43.155 183.83.130.117
156.212.112.239 125.165.14.17 14.176.55.174 135.35.79.32
115.239.57.76 115.201.133.187 14.162.117.143 114.34.179.132
113.91.142.43 29.189.221.150 101.108.120.48 1.34.232.21