City: unknown
Region: unknown
Country: China
Internet Service Provider: Microsoft (China) Co. Ltd.
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attack | Invalid user backup from 139.219.0.20 port 47876 |
2020-02-23 07:00:50 |
attackspam | Feb 20 17:51:02 ws25vmsma01 sshd[78016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 Feb 20 17:51:03 ws25vmsma01 sshd[78016]: Failed password for invalid user logadmin from 139.219.0.20 port 46554 ssh2 ... |
2020-02-21 04:09:05 |
attack | Jan 31 10:50:54 Invalid user sonita from 139.219.0.20 port 48340 |
2020-01-31 18:04:07 |
attackspambots | Invalid user postgres from 139.219.0.20 port 45946 |
2020-01-22 07:19:11 |
attackbotsspam | Unauthorized connection attempt detected from IP address 139.219.0.20 to port 2220 [J] |
2020-01-19 18:12:41 |
attack | $f2bV_matches |
2020-01-12 00:09:20 |
attackspam | Jan 8 13:13:41 server sshd\[1869\]: Invalid user user10 from 139.219.0.20 Jan 8 13:13:41 server sshd\[1869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 Jan 8 13:13:43 server sshd\[1869\]: Failed password for invalid user user10 from 139.219.0.20 port 40544 ssh2 Jan 8 16:06:12 server sshd\[9356\]: Invalid user nanamiya from 139.219.0.20 Jan 8 16:06:12 server sshd\[9356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 ... |
2020-01-08 21:50:11 |
attackbots | Lines containing failures of 139.219.0.20 Dec 31 02:21:43 shared06 sshd[19150]: Invalid user seremet from 139.219.0.20 port 52094 Dec 31 02:21:43 shared06 sshd[19150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 Dec 31 02:21:45 shared06 sshd[19150]: Failed password for invalid user seremet from 139.219.0.20 port 52094 ssh2 Dec 31 02:21:45 shared06 sshd[19150]: Received disconnect from 139.219.0.20 port 52094:11: Bye Bye [preauth] Dec 31 02:21:45 shared06 sshd[19150]: Disconnected from invalid user seremet 139.219.0.20 port 52094 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=139.219.0.20 |
2020-01-01 15:38:15 |
attackbots | Dec 31 00:35:12 server sshd\[13736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 user=root Dec 31 00:35:14 server sshd\[13736\]: Failed password for root from 139.219.0.20 port 38874 ssh2 Dec 31 11:19:24 server sshd\[3351\]: Invalid user smmsp from 139.219.0.20 Dec 31 11:19:25 server sshd\[3351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 Dec 31 11:19:26 server sshd\[3351\]: Failed password for invalid user smmsp from 139.219.0.20 port 34424 ssh2 ... |
2019-12-31 18:14:43 |
attackspambots | Dec 16 18:28:23 firewall sshd[15725]: Failed password for invalid user offill from 139.219.0.20 port 52372 ssh2 Dec 16 18:35:57 firewall sshd[15864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 user=uucp Dec 16 18:35:59 firewall sshd[15864]: Failed password for uucp from 139.219.0.20 port 38734 ssh2 ... |
2019-12-17 05:50:47 |
attack | Dec 16 00:10:06 webhost01 sshd[32030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 Dec 16 00:10:07 webhost01 sshd[32030]: Failed password for invalid user http from 139.219.0.20 port 33140 ssh2 ... |
2019-12-16 01:22:20 |
attackspam | Dec 15 02:36:38 sauna sshd[107175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 Dec 15 02:36:41 sauna sshd[107175]: Failed password for invalid user test from 139.219.0.20 port 46316 ssh2 ... |
2019-12-15 08:45:20 |
attackbots | Dec 10 21:01:01 ArkNodeAT sshd\[27728\]: Invalid user franzmann from 139.219.0.20 Dec 10 21:01:01 ArkNodeAT sshd\[27728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 Dec 10 21:01:03 ArkNodeAT sshd\[27728\]: Failed password for invalid user franzmann from 139.219.0.20 port 38302 ssh2 |
2019-12-11 04:31:06 |
attackbotsspam | Dec 9 13:56:19 hpm sshd\[3896\]: Invalid user wzhe520 from 139.219.0.20 Dec 9 13:56:19 hpm sshd\[3896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 Dec 9 13:56:22 hpm sshd\[3896\]: Failed password for invalid user wzhe520 from 139.219.0.20 port 37116 ssh2 Dec 9 14:04:32 hpm sshd\[4783\]: Invalid user vdapp from 139.219.0.20 Dec 9 14:04:32 hpm sshd\[4783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 |
2019-12-10 08:25:20 |
attack | Lines containing failures of 139.219.0.20 Dec 7 21:37:57 icinga sshd[9627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 user=games Dec 7 21:37:59 icinga sshd[9627]: Failed password for games from 139.219.0.20 port 51288 ssh2 Dec 7 21:37:59 icinga sshd[9627]: Received disconnect from 139.219.0.20 port 51288:11: Bye Bye [preauth] Dec 7 21:37:59 icinga sshd[9627]: Disconnected from authenticating user games 139.219.0.20 port 51288 [preauth] Dec 7 21:46:26 icinga sshd[11932]: Invalid user ibisate from 139.219.0.20 port 59248 Dec 7 21:46:26 icinga sshd[11932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.20 Dec 7 21:46:28 icinga sshd[11932]: Failed password for invalid user ibisate from 139.219.0.20 port 59248 ssh2 Dec 7 21:46:28 icinga sshd[11932]: Received disconnect from 139.219.0.20 port 59248:11: Bye Bye [preauth] Dec 7 21:46:28 icinga sshd[11932]: Disc........ ------------------------------ |
2019-12-08 19:37:55 |
IP | Type | Details | Datetime |
---|---|---|---|
139.219.0.102 | attack | prod11 ... |
2020-09-09 20:01:02 |
139.219.0.102 | attackbots | Sep 9 01:32:47 mail sshd\[63284\]: Invalid user shera from 139.219.0.102 ... |
2020-09-09 13:58:26 |
139.219.0.102 | attackbots | Sep 1 15:30:43 jane sshd[18170]: Failed password for root from 139.219.0.102 port 52504 ssh2 ... |
2020-09-02 01:16:17 |
139.219.0.102 | attack | Tried sshing with brute force. |
2020-08-16 08:34:13 |
139.219.0.102 | attackspambots | Aug 14 06:46:06 rancher-0 sshd[1076642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 user=root Aug 14 06:46:09 rancher-0 sshd[1076642]: Failed password for root from 139.219.0.102 port 49292 ssh2 ... |
2020-08-14 14:08:38 |
139.219.0.102 | attackbots | Failed password for root from 139.219.0.102 port 21566 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 user=root Failed password for root from 139.219.0.102 port 63408 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 user=root Failed password for root from 139.219.0.102 port 49744 ssh2 |
2020-08-02 04:51:21 |
139.219.0.102 | attack | Jul 31 23:31:34 santamaria sshd\[24041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 user=root Jul 31 23:31:36 santamaria sshd\[24041\]: Failed password for root from 139.219.0.102 port 62796 ssh2 Jul 31 23:35:57 santamaria sshd\[24174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 user=root ... |
2020-08-01 08:19:45 |
139.219.0.102 | attack | Jul 31 15:09:10 abendstille sshd\[31748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 user=root Jul 31 15:09:11 abendstille sshd\[31748\]: Failed password for root from 139.219.0.102 port 45710 ssh2 Jul 31 15:12:53 abendstille sshd\[2746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 user=root Jul 31 15:12:55 abendstille sshd\[2746\]: Failed password for root from 139.219.0.102 port 22766 ssh2 Jul 31 15:16:46 abendstille sshd\[6345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 user=root ... |
2020-08-01 04:11:08 |
139.219.0.102 | attackbotsspam | Jul 29 19:28:15 ift sshd\[14466\]: Invalid user gengxin from 139.219.0.102Jul 29 19:28:18 ift sshd\[14466\]: Failed password for invalid user gengxin from 139.219.0.102 port 59032 ssh2Jul 29 19:31:02 ift sshd\[15229\]: Invalid user arjun from 139.219.0.102Jul 29 19:31:03 ift sshd\[15229\]: Failed password for invalid user arjun from 139.219.0.102 port 63240 ssh2Jul 29 19:33:49 ift sshd\[15462\]: Invalid user xn from 139.219.0.102 ... |
2020-07-30 02:28:00 |
139.219.0.102 | attackspambots | Jul 25 17:27:33 vmd36147 sshd[9571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 Jul 25 17:27:35 vmd36147 sshd[9571]: Failed password for invalid user sona from 139.219.0.102 port 25978 ssh2 Jul 25 17:31:30 vmd36147 sshd[18209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 ... |
2020-07-26 01:15:49 |
139.219.0.102 | attackbots | Jul 24 16:34:57 mail sshd[24068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 Jul 24 16:34:58 mail sshd[24068]: Failed password for invalid user manoj from 139.219.0.102 port 10934 ssh2 ... |
2020-07-24 23:41:43 |
139.219.0.102 | attackspambots | Invalid user rolo from 139.219.0.102 port 24558 |
2020-07-15 08:58:29 |
139.219.0.102 | attack | 2020-07-11T10:15:05.810912vps773228.ovh.net sshd[10786]: Invalid user xxshi from 139.219.0.102 port 58152 2020-07-11T10:15:05.827025vps773228.ovh.net sshd[10786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.0.102 2020-07-11T10:15:05.810912vps773228.ovh.net sshd[10786]: Invalid user xxshi from 139.219.0.102 port 58152 2020-07-11T10:15:08.101727vps773228.ovh.net sshd[10786]: Failed password for invalid user xxshi from 139.219.0.102 port 58152 ssh2 2020-07-11T10:18:06.198175vps773228.ovh.net sshd[10807]: Invalid user juliette from 139.219.0.102 port 16978 ... |
2020-07-11 16:33:50 |
139.219.0.102 | attackspambots | Invalid user russel from 139.219.0.102 port 39168 |
2020-07-11 08:05:10 |
139.219.0.102 | attackspam | $f2bV_matches |
2020-06-29 13:30:16 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.219.0.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.219.0.20. IN A
;; AUTHORITY SECTION:
. 452 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019120800 1800 900 604800 86400
;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 19:37:51 CST 2019
;; MSG SIZE rcvd: 116
Host 20.0.219.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 20.0.219.139.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
103.141.137.39 | attack | 2019-12-17T05:55:44.406211www postfix/smtpd[23057]: warning: unknown[103.141.137.39]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-12-17T05:56:00.260723www postfix/smtpd[23057]: warning: unknown[103.141.137.39]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-12-17T05:56:13.387223www postfix/smtpd[23057]: warning: unknown[103.141.137.39]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-17 13:39:18 |
40.92.4.28 | attackbotsspam | Dec 17 07:56:04 debian-2gb-vpn-nbg1-1 kernel: [936932.019178] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.4.28 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=229 ID=40600 DF PROTO=TCP SPT=39747 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-17 13:44:54 |
46.172.223.230 | attack | DATE:2019-12-17 05:56:26, IP:46.172.223.230, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2019-12-17 13:30:33 |
2606:4700:30::681b:8bc8 | attack | www.standjackets.com fake store |
2019-12-17 14:02:07 |
74.219.184.26 | attackbots | IMAP |
2019-12-17 13:56:06 |
111.59.92.70 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-17 13:58:42 |
75.31.93.181 | attackspam | Dec 17 06:07:57 eventyay sshd[5455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.31.93.181 Dec 17 06:07:59 eventyay sshd[5455]: Failed password for invalid user markham from 75.31.93.181 port 30702 ssh2 Dec 17 06:13:56 eventyay sshd[5669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.31.93.181 ... |
2019-12-17 13:40:58 |
218.92.0.175 | attackbotsspam | Dec 17 02:50:10 firewall sshd[26903]: Failed password for root from 218.92.0.175 port 6694 ssh2 Dec 17 02:50:14 firewall sshd[26903]: Failed password for root from 218.92.0.175 port 6694 ssh2 Dec 17 02:50:19 firewall sshd[26903]: Failed password for root from 218.92.0.175 port 6694 ssh2 ... |
2019-12-17 13:58:31 |
223.247.223.39 | attackspam | Dec 17 05:12:12 hcbbdb sshd\[26194\]: Invalid user vh from 223.247.223.39 Dec 17 05:12:12 hcbbdb sshd\[26194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.223.39 Dec 17 05:12:14 hcbbdb sshd\[26194\]: Failed password for invalid user vh from 223.247.223.39 port 55950 ssh2 Dec 17 05:22:06 hcbbdb sshd\[27346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.223.39 user=root Dec 17 05:22:08 hcbbdb sshd\[27346\]: Failed password for root from 223.247.223.39 port 59108 ssh2 |
2019-12-17 14:00:58 |
167.205.14.165 | attack | 1576558558 - 12/17/2019 05:55:58 Host: 167.205.14.165/167.205.14.165 Port: 445 TCP Blocked |
2019-12-17 13:49:54 |
23.247.33.61 | attack | Dec 17 06:08:05 OPSO sshd\[28735\]: Invalid user mergel from 23.247.33.61 port 49052 Dec 17 06:08:05 OPSO sshd\[28735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.247.33.61 Dec 17 06:08:07 OPSO sshd\[28735\]: Failed password for invalid user mergel from 23.247.33.61 port 49052 ssh2 Dec 17 06:14:04 OPSO sshd\[29647\]: Invalid user melkevik from 23.247.33.61 port 54726 Dec 17 06:14:04 OPSO sshd\[29647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.247.33.61 |
2019-12-17 13:24:45 |
59.74.224.236 | attackbots | Lines containing failures of 59.74.224.236 Dec 17 00:54:03 keyhelp sshd[1830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.74.224.236 user=games Dec 17 00:54:05 keyhelp sshd[1830]: Failed password for games from 59.74.224.236 port 35862 ssh2 Dec 17 00:54:05 keyhelp sshd[1830]: Received disconnect from 59.74.224.236 port 35862:11: Bye Bye [preauth] Dec 17 00:54:05 keyhelp sshd[1830]: Disconnected from authenticating user games 59.74.224.236 port 35862 [preauth] Dec 17 01:10:04 keyhelp sshd[6280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.74.224.236 user=r.r Dec 17 01:10:06 keyhelp sshd[6280]: Failed password for r.r from 59.74.224.236 port 55380 ssh2 Dec 17 01:10:06 keyhelp sshd[6280]: Received disconnect from 59.74.224.236 port 55380:11: Bye Bye [preauth] Dec 17 01:10:06 keyhelp sshd[6280]: Disconnected from authenticating user r.r 59.74.224.236 port 55380 [preauth] Dec 17 0........ ------------------------------ |
2019-12-17 13:44:09 |
176.235.208.210 | attack | Dec 17 00:14:44 plusreed sshd[20853]: Invalid user hashimoto01 from 176.235.208.210 ... |
2019-12-17 13:26:00 |
40.92.4.25 | attackspambots | Dec 17 07:56:04 debian-2gb-vpn-nbg1-1 kernel: [936932.519633] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.4.25 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=101 ID=11547 DF PROTO=TCP SPT=36481 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0 |
2019-12-17 13:45:23 |
2606:4700:30::681b:8ac8 | attackspam | www.standjackets.com fake store |
2019-12-17 13:53:40 |