City: unknown
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
139.59.41.222 | attack | Fraud connect |
2024-05-17 13:22:44 |
139.59.41.229 | attack | Jul 28 17:20:44 saturn sshd[314292]: Invalid user lyj from 139.59.41.229 port 43460 Jul 28 17:20:46 saturn sshd[314292]: Failed password for invalid user lyj from 139.59.41.229 port 43460 ssh2 Jul 28 17:27:28 saturn sshd[314543]: Invalid user wcm from 139.59.41.229 port 50226 ... |
2020-07-29 00:08:11 |
139.59.41.154 | attackbots | Mar 9 07:23:36 v22018086721571380 sshd[4898]: Failed password for invalid user daniel from 139.59.41.154 port 44426 ssh2 Mar 9 07:32:15 v22018086721571380 sshd[6383]: Failed password for invalid user olivier from 139.59.41.154 port 56290 ssh2 |
2020-03-09 15:13:02 |
139.59.41.154 | attack | $f2bV_matches |
2020-03-08 06:21:15 |
139.59.41.154 | attack | Mar 7 14:23:14 DAAP sshd[30518]: Invalid user shuangbo from 139.59.41.154 port 39176 Mar 7 14:23:14 DAAP sshd[30518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 Mar 7 14:23:14 DAAP sshd[30518]: Invalid user shuangbo from 139.59.41.154 port 39176 Mar 7 14:23:17 DAAP sshd[30518]: Failed password for invalid user shuangbo from 139.59.41.154 port 39176 ssh2 Mar 7 14:33:13 DAAP sshd[30645]: Invalid user nagios from 139.59.41.154 port 51530 ... |
2020-03-07 23:33:46 |
139.59.41.154 | attackspambots | Invalid user tmpu1 from 139.59.41.154 port 46412 |
2020-03-04 02:17:39 |
139.59.41.154 | attackbots | Mar 2 14:41:13 MK-Soft-Root1 sshd[31471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 Mar 2 14:41:16 MK-Soft-Root1 sshd[31471]: Failed password for invalid user hh from 139.59.41.154 port 51194 ssh2 ... |
2020-03-02 22:21:32 |
139.59.41.154 | attackbots | suspicious action Mon, 24 Feb 2020 01:57:20 -0300 |
2020-02-24 14:07:23 |
139.59.41.170 | attackbots | Unauthorized connection attempt detected from IP address 139.59.41.170 to port 2220 [J] |
2020-02-23 15:39:49 |
139.59.41.154 | attackbots | Feb 17 17:25:06 haigwepa sshd[31392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 Feb 17 17:25:08 haigwepa sshd[31392]: Failed password for invalid user security from 139.59.41.154 port 42356 ssh2 ... |
2020-02-18 00:29:33 |
139.59.41.154 | attackbotsspam | Feb 10 20:34:58 sd-53420 sshd\[12346\]: Invalid user wsk from 139.59.41.154 Feb 10 20:34:58 sd-53420 sshd\[12346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 Feb 10 20:35:00 sd-53420 sshd\[12346\]: Failed password for invalid user wsk from 139.59.41.154 port 59138 ssh2 Feb 10 20:39:14 sd-53420 sshd\[12779\]: Invalid user uks from 139.59.41.154 Feb 10 20:39:14 sd-53420 sshd\[12779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 ... |
2020-02-11 03:51:01 |
139.59.41.154 | attack | Feb 7 19:08:41 v22018076622670303 sshd\[4119\]: Invalid user fks from 139.59.41.154 port 50316 Feb 7 19:08:41 v22018076622670303 sshd\[4119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 Feb 7 19:08:43 v22018076622670303 sshd\[4119\]: Failed password for invalid user fks from 139.59.41.154 port 50316 ssh2 ... |
2020-02-08 02:50:14 |
139.59.41.154 | attackspambots | Feb 1 07:05:34 haigwepa sshd[32057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 Feb 1 07:05:37 haigwepa sshd[32057]: Failed password for invalid user musikbot from 139.59.41.154 port 57310 ssh2 ... |
2020-02-01 14:43:29 |
139.59.41.154 | attackbots | Feb 1 02:43:24 legacy sshd[22766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 Feb 1 02:43:27 legacy sshd[22766]: Failed password for invalid user tester from 139.59.41.154 port 34730 ssh2 Feb 1 02:47:42 legacy sshd[22932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154 ... |
2020-02-01 09:55:19 |
139.59.41.170 | attackspam | Unauthorized connection attempt detected from IP address 139.59.41.170 to port 2220 [J] |
2020-01-29 15:53:40 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.41.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.59.41.57. IN A
;; AUTHORITY SECTION:
. 527 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 15:06:17 CST 2022
;; MSG SIZE rcvd: 105
57.41.59.139.in-addr.arpa domain name pointer detour.3550008888.zbv.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
57.41.59.139.in-addr.arpa name = detour.3550008888.zbv.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
122.116.218.217 | attackbotsspam | 23/tcp [2020-02-09]1pkt |
2020-02-09 23:56:54 |
185.176.27.6 | attackbots | Feb 9 17:05:54 h2177944 kernel: \[4462384.701434\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=37898 PROTO=TCP SPT=55796 DPT=5797 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 9 17:05:54 h2177944 kernel: \[4462384.701449\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=37898 PROTO=TCP SPT=55796 DPT=5797 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 9 17:07:04 h2177944 kernel: \[4462454.141720\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=1762 PROTO=TCP SPT=55796 DPT=4740 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 9 17:07:04 h2177944 kernel: \[4462454.141735\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=1762 PROTO=TCP SPT=55796 DPT=4740 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 9 17:09:44 h2177944 kernel: \[4462614.991987\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.6 DST=85.214.117.9 LEN=40 |
2020-02-10 00:10:27 |
162.243.121.211 | attack | SSH bruteforce |
2020-02-10 00:16:09 |
85.93.20.66 | attack | 21 attempts against mh-misbehave-ban on plane |
2020-02-09 23:57:31 |
212.92.111.25 | attackspambots | RDPBruteCAu |
2020-02-10 00:04:08 |
49.234.15.91 | attackspambots | Feb 9 15:07:09 game-panel sshd[20801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.15.91 Feb 9 15:07:12 game-panel sshd[20801]: Failed password for invalid user wlx from 49.234.15.91 port 37684 ssh2 Feb 9 15:10:07 game-panel sshd[20986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.15.91 |
2020-02-10 00:16:52 |
66.147.237.24 | attackbotsspam | 02/09/2020-10:46:49.887603 66.147.237.24 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-09 23:49:34 |
112.85.42.188 | attackspambots | 02/09/2020-11:20:08.185304 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan |
2020-02-10 00:20:25 |
103.76.208.92 | attackspam | 1433/tcp [2020-02-09]1pkt |
2020-02-09 23:50:28 |
212.92.115.107 | attackbots | RDPBruteCAu |
2020-02-10 00:08:55 |
89.136.31.9 | attackspam | Brute force attempt |
2020-02-09 23:41:58 |
42.112.105.198 | attack | 1581255363 - 02/09/2020 14:36:03 Host: 42.112.105.198/42.112.105.198 Port: 445 TCP Blocked |
2020-02-09 23:46:23 |
23.129.64.155 | attack | 22/tcp 22/tcp 22/tcp [2020-02-09]3pkt |
2020-02-10 00:02:19 |
122.117.42.62 | attackspam | Unauthorized connection attempt detected from IP address 122.117.42.62 to port 2323 |
2020-02-09 23:44:01 |
182.69.14.137 | attack | 445/tcp [2020-02-09]1pkt |
2020-02-09 23:45:28 |