City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
139.255.52.58 | attackbotsspam | 445/tcp [2020-10-03]1pkt |
2020-10-05 08:03:32 |
139.255.52.58 | attackbotsspam | 445/tcp [2020-10-03]1pkt |
2020-10-05 00:25:34 |
139.255.52.58 | attackbotsspam | 445/tcp [2020-10-03]1pkt |
2020-10-04 16:08:24 |
139.255.52.218 | attackspam | Unauthorized connection attempt from IP address 139.255.52.218 on Port 445(SMB) |
2020-02-08 04:49:50 |
139.255.52.203 | attack | 2019-07-09 06:35:35 1hkhqo-0006V5-70 SMTP connection from \(ln-static-139-255-52-203.link.net.id\) \[139.255.52.203\]:39249 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 06:35:46 1hkhqz-0006VG-2e SMTP connection from \(ln-static-139-255-52-203.link.net.id\) \[139.255.52.203\]:36139 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 06:35:54 1hkhr7-0006VN-HF SMTP connection from \(ln-static-139-255-52-203.link.net.id\) \[139.255.52.203\]:48745 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 00:47:16 |
139.255.52.98 | attackbotsspam | Unauthorized connection attempt from IP address 139.255.52.98 on Port 445(SMB) |
2020-01-17 23:50:34 |
139.255.52.68 | attackbots | 445/tcp [2019-07-30]1pkt |
2019-07-31 03:27:38 |
139.255.52.203 | attackbots | Mail sent to address hacked/leaked from Last.fm |
2019-07-15 14:19:36 |
139.255.52.218 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 00:20:46,229 INFO [shellcode_manager] (139.255.52.218) no match, writing hexdump (7edbc2fd47b865f111efd673b193f6b5 :2164185) - MS17010 (EternalBlue) |
2019-07-06 13:28:06 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.255.52.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.255.52.12. IN A
;; AUTHORITY SECTION:
. 143 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:03:50 CST 2022
;; MSG SIZE rcvd: 106
12.52.255.139.in-addr.arpa domain name pointer ln-static-139-255-52-12.link.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.52.255.139.in-addr.arpa name = ln-static-139-255-52-12.link.net.id.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
159.89.153.54 | attack | Sep 28 02:05:10 aat-srv002 sshd[3377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.153.54 Sep 28 02:05:12 aat-srv002 sshd[3377]: Failed password for invalid user nagios from 159.89.153.54 port 47942 ssh2 Sep 28 02:09:31 aat-srv002 sshd[3506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.153.54 Sep 28 02:09:33 aat-srv002 sshd[3506]: Failed password for invalid user wisconsin from 159.89.153.54 port 59538 ssh2 ... |
2019-09-28 17:11:43 |
157.55.39.92 | attack | Automatic report - Banned IP Access |
2019-09-28 17:12:56 |
177.103.176.202 | attackbots | Sep 28 08:37:00 web8 sshd\[5383\]: Invalid user administrador from 177.103.176.202 Sep 28 08:37:00 web8 sshd\[5383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.176.202 Sep 28 08:37:02 web8 sshd\[5383\]: Failed password for invalid user administrador from 177.103.176.202 port 48720 ssh2 Sep 28 08:45:13 web8 sshd\[9151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.176.202 user=root Sep 28 08:45:15 web8 sshd\[9151\]: Failed password for root from 177.103.176.202 port 40978 ssh2 |
2019-09-28 17:08:22 |
81.30.208.114 | attack | Sep 28 07:09:56 tuotantolaitos sshd[6237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.208.114 Sep 28 07:09:58 tuotantolaitos sshd[6237]: Failed password for invalid user bread@123 from 81.30.208.114 port 57836 ssh2 ... |
2019-09-28 17:21:32 |
182.74.190.198 | attackbots | Sep 28 10:58:51 core sshd[12889]: Invalid user creative from 182.74.190.198 port 44894 Sep 28 10:58:53 core sshd[12889]: Failed password for invalid user creative from 182.74.190.198 port 44894 ssh2 ... |
2019-09-28 17:07:12 |
139.162.109.43 | attackbots | Unauthorised access (Sep 28) SRC=139.162.109.43 LEN=40 TOS=0x10 PREC=0x40 TTL=243 ID=54321 TCP DPT=111 WINDOW=65535 SYN Unauthorised access (Sep 24) SRC=139.162.109.43 LEN=40 TTL=243 ID=54321 TCP DPT=111 WINDOW=65535 SYN Unauthorised access (Sep 22) SRC=139.162.109.43 LEN=40 TTL=243 ID=54321 TCP DPT=111 WINDOW=65535 SYN |
2019-09-28 17:39:59 |
50.228.135.162 | attack | 445/tcp 445/tcp 445/tcp [2019-08-29/09-28]3pkt |
2019-09-28 17:31:29 |
36.103.241.211 | attack | 2019-09-28T07:58:00.077854 sshd[17745]: Invalid user webmaster from 36.103.241.211 port 50966 2019-09-28T07:58:00.092376 sshd[17745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.103.241.211 2019-09-28T07:58:00.077854 sshd[17745]: Invalid user webmaster from 36.103.241.211 port 50966 2019-09-28T07:58:01.789392 sshd[17745]: Failed password for invalid user webmaster from 36.103.241.211 port 50966 ssh2 2019-09-28T08:02:01.835002 sshd[17863]: Invalid user ubuntu from 36.103.241.211 port 48306 ... |
2019-09-28 17:01:41 |
213.98.90.66 | attackbots | Chat Spam |
2019-09-28 17:33:06 |
121.44.151.123 | attack | 19/9/27@23:49:41: FAIL: IoT-Telnet address from=121.44.151.123 ... |
2019-09-28 17:38:46 |
23.94.133.28 | attackbots | Invalid user user from 23.94.133.28 port 37048 |
2019-09-28 17:34:43 |
222.186.180.19 | attack | Sep 28 10:58:55 meumeu sshd[25204]: Failed password for root from 222.186.180.19 port 40640 ssh2 Sep 28 10:59:15 meumeu sshd[25204]: error: maximum authentication attempts exceeded for root from 222.186.180.19 port 40640 ssh2 [preauth] Sep 28 10:59:25 meumeu sshd[25258]: Failed password for root from 222.186.180.19 port 16022 ssh2 ... |
2019-09-28 17:02:17 |
35.233.101.146 | attack | Sep 27 23:09:08 web1 sshd\[15570\]: Invalid user agas from 35.233.101.146 Sep 27 23:09:08 web1 sshd\[15570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.233.101.146 Sep 27 23:09:10 web1 sshd\[15570\]: Failed password for invalid user agas from 35.233.101.146 port 43462 ssh2 Sep 27 23:13:11 web1 sshd\[15938\]: Invalid user gmodttt from 35.233.101.146 Sep 27 23:13:11 web1 sshd\[15938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.233.101.146 |
2019-09-28 17:26:34 |
218.164.106.125 | attack | Telnet Server BruteForce Attack |
2019-09-28 17:02:39 |
190.184.201.146 | attackbotsspam | SPF Fail sender not permitted to send mail for @floresfunza.com / Sent mail to target address hacked/leaked from abandonia in 2016 |
2019-09-28 17:05:29 |