City: unknown
Region: unknown
Country: Canada
Internet Service Provider: VeryGames
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attack |
|
2020-09-15 01:36:02 |
attack | SIP/5060 Probe, BF, Hack - |
2020-09-14 17:20:03 |
attack | 139.99.114.230 was recorded 15 times by 6 hosts attempting to connect to the following ports: 33185,51856,26014,50570. Incident counter (4h, 24h, all-time): 15, 85, 146 |
2020-05-12 02:15:51 |
attack | 139.99.114.230 was recorded 10 times by 4 hosts attempting to connect to the following ports: 26014,33185,51856,50570. Incident counter (4h, 24h, all-time): 10, 25, 38 |
2020-05-10 08:22:12 |
IP | Type | Details | Datetime |
---|---|---|---|
139.99.114.236 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2019-07-20 01:01:16 |
139.99.114.236 | attack | 139.99.114.236 - - \[23/Jun/2019:14:09:15 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 139.99.114.236 - - \[23/Jun/2019:14:09:16 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 139.99.114.236 - - \[23/Jun/2019:14:09:17 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 139.99.114.236 - - \[23/Jun/2019:14:09:17 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 139.99.114.236 - - \[23/Jun/2019:14:09:18 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 139.99.114.236 - - \[23/Jun/2019:14:09:18 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:6 |
2019-06-23 22:07:38 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.114.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29090
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.114.230. IN A
;; AUTHORITY SECTION:
. 146 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020050901 1800 900 604800 86400
;; Query time: 132 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 10 08:22:09 CST 2020
;; MSG SIZE rcvd: 118
230.114.99.139.in-addr.arpa domain name pointer ip230.ip-139-99-114.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
230.114.99.139.in-addr.arpa name = ip230.ip-139-99-114.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
64.62.197.115 | attack | Vulnerability Scanner |
2024-04-22 13:06:22 |
66.150.8.90 | attackproxy | Vulnerability Scanner |
2024-04-19 23:59:04 |
193.56.113.29 | spam | Bad IP: PHP Spammer |
2024-04-24 12:53:50 |
65.49.1.43 | attack | Malicious IP / Malware |
2024-04-21 02:27:02 |
36.99.136.136 | attack | Vulnerability Scanner |
2024-04-22 01:00:09 |
185.11.61.106 | attack | Malicious IP |
2024-04-20 13:12:11 |
128.14.209.34 | attack | Malicious IP |
2024-04-21 01:52:16 |
64.225.120.251 | attack | Malicious IP |
2024-04-24 12:46:16 |
185.180.143.169 | botsattackproxy | Botnet DB Scanner |
2024-04-20 00:11:44 |
80.66.76.130 | attack | Vulnerability Scanner |
2024-04-22 20:50:38 |
184.105.139.90 | botsattackproxy | Ddos bot |
2024-04-20 00:26:45 |
79.124.62.82 | attack | Vulnerability Scanner |
2024-04-24 12:57:20 |
64.62.197.19 | botsattackproxy | Vulnerability Scanner |
2024-04-25 13:16:10 |
205.210.31.211 | attack | Malicious IP / Malware |
2024-04-21 02:18:17 |
62.216.86.69 | attackproxy | Malicious IP / Malware |
2024-04-23 12:47:09 |