City: unknown
Region: unknown
Country: Singapore
Internet Service Provider: OVH Singapore Pte. Ltd
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackspam | Unauthorized IMAP connection attempt |
2020-07-15 18:43:50 |
IP | Type | Details | Datetime |
---|---|---|---|
139.99.105.138 | attackspambots | Aug 26 14:31:35 v22019038103785759 sshd\[3608\]: Invalid user kali from 139.99.105.138 port 55962 Aug 26 14:31:35 v22019038103785759 sshd\[3608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 Aug 26 14:31:36 v22019038103785759 sshd\[3608\]: Failed password for invalid user kali from 139.99.105.138 port 55962 ssh2 Aug 26 14:35:49 v22019038103785759 sshd\[3981\]: Invalid user csvn from 139.99.105.138 port 60242 Aug 26 14:35:49 v22019038103785759 sshd\[3981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 ... |
2020-08-26 23:00:18 |
139.99.105.138 | attack | Aug 18 14:31:41 home sshd[979811]: Invalid user admin from 139.99.105.138 port 53796 Aug 18 14:31:41 home sshd[979811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 Aug 18 14:31:41 home sshd[979811]: Invalid user admin from 139.99.105.138 port 53796 Aug 18 14:31:43 home sshd[979811]: Failed password for invalid user admin from 139.99.105.138 port 53796 ssh2 Aug 18 14:34:35 home sshd[980761]: Invalid user dispatch from 139.99.105.138 port 38642 ... |
2020-08-18 22:01:54 |
139.99.105.138 | attack | Aug 3 06:54:26 django-0 sshd[13889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 user=root Aug 3 06:54:28 django-0 sshd[13889]: Failed password for root from 139.99.105.138 port 58024 ssh2 ... |
2020-08-03 16:07:08 |
139.99.105.138 | attackbots | Aug 2 12:15:54 webhost01 sshd[26524]: Failed password for root from 139.99.105.138 port 37602 ssh2 ... |
2020-08-02 13:26:47 |
139.99.105.138 | attack | Aug 1 16:22:39 marvibiene sshd[32323]: Failed password for root from 139.99.105.138 port 49706 ssh2 Aug 1 16:27:09 marvibiene sshd[304]: Failed password for root from 139.99.105.138 port 59352 ssh2 |
2020-08-01 23:41:41 |
139.99.105.138 | attack | Jul 23 14:30:36 PorscheCustomer sshd[25268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 Jul 23 14:30:38 PorscheCustomer sshd[25268]: Failed password for invalid user openproject from 139.99.105.138 port 34076 ssh2 Jul 23 14:34:31 PorscheCustomer sshd[25358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 ... |
2020-07-23 20:46:46 |
139.99.105.138 | attack | $f2bV_matches |
2020-07-23 14:14:32 |
139.99.105.138 | attackspam | Jul 12 02:15:15 localhost sshd[3340308]: Invalid user apples from 139.99.105.138 port 50118 ... |
2020-07-12 03:06:13 |
139.99.105.138 | attackbots | Invalid user pool from 139.99.105.138 port 34172 |
2020-07-11 16:10:00 |
139.99.105.138 | attackspambots | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-07-04 15:47:46 |
139.99.105.138 | attackspam | 2020-07-04T03:30:58.996977mail.standpoint.com.ua sshd[1375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 user=root 2020-07-04T03:31:00.857197mail.standpoint.com.ua sshd[1375]: Failed password for root from 139.99.105.138 port 50264 ssh2 2020-07-04T03:34:21.127530mail.standpoint.com.ua sshd[1868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 user=root 2020-07-04T03:34:23.188953mail.standpoint.com.ua sshd[1868]: Failed password for root from 139.99.105.138 port 46926 ssh2 2020-07-04T03:37:37.288944mail.standpoint.com.ua sshd[2361]: Invalid user debian from 139.99.105.138 port 43608 ... |
2020-07-04 11:37:39 |
139.99.105.138 | attack | $f2bV_matches |
2020-06-28 22:02:08 |
139.99.105.138 | attackbotsspam | Jun 26 11:06:55 haigwepa sshd[18186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 Jun 26 11:06:58 haigwepa sshd[18186]: Failed password for invalid user support from 139.99.105.138 port 48508 ssh2 ... |
2020-06-26 17:46:55 |
139.99.105.138 | attackbotsspam | Jun 14 02:47:22 web1 sshd\[30479\]: Invalid user user from 139.99.105.138 Jun 14 02:47:22 web1 sshd\[30479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 Jun 14 02:47:23 web1 sshd\[30479\]: Failed password for invalid user user from 139.99.105.138 port 38566 ssh2 Jun 14 02:51:08 web1 sshd\[30799\]: Invalid user ismenia from 139.99.105.138 Jun 14 02:51:08 web1 sshd\[30799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 |
2020-06-14 21:01:38 |
139.99.105.138 | attackspambots | Jun 6 08:19:46 server1 sshd\[23368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 user=root Jun 6 08:19:48 server1 sshd\[23368\]: Failed password for root from 139.99.105.138 port 51524 ssh2 Jun 6 08:23:50 server1 sshd\[24560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 user=root Jun 6 08:23:52 server1 sshd\[24560\]: Failed password for root from 139.99.105.138 port 54374 ssh2 Jun 6 08:27:43 server1 sshd\[25723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138 user=root ... |
2020-06-06 23:07:36 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.105.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.105.5. IN A
;; AUTHORITY SECTION:
. 242 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020071500 1800 900 604800 86400
;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 15 18:43:47 CST 2020
;; MSG SIZE rcvd: 116
5.105.99.139.in-addr.arpa domain name pointer 5.ip-139-99-105.eu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
5.105.99.139.in-addr.arpa name = 5.ip-139-99-105.eu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
31.13.190.254 | attack | fell into ViewStateTrap:Lusaka01 |
2019-08-02 05:38:53 |
185.36.81.55 | attackbots | 2019-08-01T22:43:16.205471ns1.unifynetsol.net postfix/smtpd\[18725\]: warning: unknown\[185.36.81.55\]: SASL LOGIN authentication failed: authentication failure 2019-08-01T23:27:39.268857ns1.unifynetsol.net postfix/smtpd\[22303\]: warning: unknown\[185.36.81.55\]: SASL LOGIN authentication failed: authentication failure 2019-08-02T00:11:34.319633ns1.unifynetsol.net postfix/smtpd\[706\]: warning: unknown\[185.36.81.55\]: SASL LOGIN authentication failed: authentication failure 2019-08-02T00:55:37.036732ns1.unifynetsol.net postfix/smtpd\[9950\]: warning: unknown\[185.36.81.55\]: SASL LOGIN authentication failed: authentication failure 2019-08-02T01:39:27.744781ns1.unifynetsol.net postfix/smtpd\[15089\]: warning: unknown\[185.36.81.55\]: SASL LOGIN authentication failed: authentication failure |
2019-08-02 05:41:55 |
167.114.232.244 | attackbots | Blocked range because of multiple attacks in the past. @ 2019-08-01T01:55:09+02:00. |
2019-08-02 05:14:14 |
69.160.57.120 | attack | 69.160.57.120 - - [01/Aug/2019:02:41:52 +0500] "GET /TP/public/index.php HTTP/1.1" 301 185 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 69.160.57.120 - - [01/Aug/2019:02:41:52 +0500] "GET /TP/index.php HTTP/1.1" 301 185 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 69.160.57.120 - - [01/Aug/2019:02:41:52 +0500] "GET /thinkphp/html/public/index.php HTTP/1.1" 301 185 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 69.160.57.120 - - [01/Aug/2019:02:41:53 +0500] "GET /html/public/index.php HTTP/1.1" 301 185 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 69.160.57.120 - - [01/Aug/2019:02:41:53 +0500] "GET /public/index.php HTTP/1.1" 301 185 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.0;en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6)" 69.160.57.120 - - [01/Aug/2019:02:41:53 +0500] "GET /TP/html/public/index.php HTTP/1.1" 301 185 "-" "Mozilla/5. |
2019-08-02 05:42:50 |
185.36.81.164 | attackspam | 2019-08-01T22:45:24.314112ns1.unifynetsol.net postfix/smtpd\[22303\]: warning: unknown\[185.36.81.164\]: SASL LOGIN authentication failed: authentication failure 2019-08-01T23:38:18.713028ns1.unifynetsol.net postfix/smtpd\[22303\]: warning: unknown\[185.36.81.164\]: SASL LOGIN authentication failed: authentication failure 2019-08-02T00:30:09.088992ns1.unifynetsol.net postfix/smtpd\[5328\]: warning: unknown\[185.36.81.164\]: SASL LOGIN authentication failed: authentication failure 2019-08-02T01:22:50.359912ns1.unifynetsol.net postfix/smtpd\[9950\]: warning: unknown\[185.36.81.164\]: SASL LOGIN authentication failed: authentication failure 2019-08-02T02:15:28.795783ns1.unifynetsol.net postfix/smtpd\[17282\]: warning: unknown\[185.36.81.164\]: SASL LOGIN authentication failed: authentication failure |
2019-08-02 05:20:06 |
219.145.144.65 | attack | This IP address was blacklisted for the following reason: /blogswp-login.php @ 2019-07-31T15:16:21+02:00. |
2019-08-02 05:38:05 |
212.91.125.90 | attackspam | RDP |
2019-08-02 05:22:02 |
165.227.143.37 | attack | Aug 1 21:10:34 sshgateway sshd\[30190\]: Invalid user backend from 165.227.143.37 Aug 1 21:10:34 sshgateway sshd\[30190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.143.37 Aug 1 21:10:36 sshgateway sshd\[30190\]: Failed password for invalid user backend from 165.227.143.37 port 58480 ssh2 |
2019-08-02 06:04:28 |
154.83.29.6 | attack | Aug 1 16:58:56 localhost sshd\[17649\]: Invalid user carlos2 from 154.83.29.6 Aug 1 16:58:56 localhost sshd\[17649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.29.6 Aug 1 16:58:59 localhost sshd\[17649\]: Failed password for invalid user carlos2 from 154.83.29.6 port 58340 ssh2 Aug 1 17:07:01 localhost sshd\[18143\]: Invalid user kasandra from 154.83.29.6 Aug 1 17:07:01 localhost sshd\[18143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.29.6 ... |
2019-08-02 05:49:56 |
103.83.178.58 | attackspam | 8291/tcp |
2019-08-02 05:58:55 |
187.6.249.142 | attack | Aug 1 14:57:54 vpn01 sshd\[14048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.6.249.142 user=root Aug 1 14:57:55 vpn01 sshd\[14048\]: Failed password for root from 187.6.249.142 port 41702 ssh2 Aug 1 15:15:30 vpn01 sshd\[14174\]: Invalid user nexus from 187.6.249.142 |
2019-08-02 05:28:58 |
181.127.185.97 | attackbotsspam | Aug 1 23:24:59 vps691689 sshd[12556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.127.185.97 Aug 1 23:25:01 vps691689 sshd[12556]: Failed password for invalid user carrie from 181.127.185.97 port 39770 ssh2 ... |
2019-08-02 05:48:16 |
212.92.121.177 | attack | B: Magento admin pass test (wrong country) |
2019-08-02 05:36:48 |
49.88.112.60 | attack | Aug 1 23:15:12 rpi sshd[26212]: Failed password for root from 49.88.112.60 port 22703 ssh2 Aug 1 23:15:15 rpi sshd[26212]: Failed password for root from 49.88.112.60 port 22703 ssh2 |
2019-08-02 05:44:10 |
207.180.234.126 | attackbotsspam | User agent in blacklist: Mozilla/5.0 (compatible; MJ12bot/v1.4.8; http://mj12bot.com/) @ 2019-08-01T06:36:34+02:00. |
2019-08-02 05:24:39 |