City: unknown
Region: unknown
Country: Singapore
Internet Service Provider: OVH Singapore Pte. Ltd
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attackspambots | fail2ban |
2019-09-25 18:49:19 |
attackbotsspam | Sep 20 00:32:12 DAAP sshd[9381]: Invalid user fctserver from 139.99.37.157 port 34136 ... |
2019-09-20 08:38:58 |
IP | Type | Details | Datetime |
---|---|---|---|
139.99.37.24 | attackspambots | 2020-06-13T15:17:21.253757h2857900.stratoserver.net sshd[14742]: Invalid user fake from 139.99.37.24 port 42658 2020-06-13T15:17:22.729998h2857900.stratoserver.net sshd[14744]: Invalid user admin from 139.99.37.24 port 45648 ... |
2020-06-13 21:21:40 |
139.99.37.130 | attackspambots | Nov 22 21:33:45 DAAP sshd[24409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 user=backup Nov 22 21:33:46 DAAP sshd[24409]: Failed password for backup from 139.99.37.130 port 47792 ssh2 Nov 22 21:37:57 DAAP sshd[24440]: Invalid user shopsupport from 139.99.37.130 port 57114 Nov 22 21:37:57 DAAP sshd[24440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Nov 22 21:37:57 DAAP sshd[24440]: Invalid user shopsupport from 139.99.37.130 port 57114 Nov 22 21:37:59 DAAP sshd[24440]: Failed password for invalid user shopsupport from 139.99.37.130 port 57114 ssh2 ... |
2019-11-23 06:53:54 |
139.99.37.130 | attack | Invalid user barit from 139.99.37.130 port 48420 |
2019-11-16 21:50:11 |
139.99.37.130 | attack | [Aegis] @ 2019-11-09 07:27:59 0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-11-09 15:57:41 |
139.99.37.130 | attackspambots | Nov 2 17:13:22 [host] sshd[27934]: Invalid user danb from 139.99.37.130 Nov 2 17:13:22 [host] sshd[27934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Nov 2 17:13:24 [host] sshd[27934]: Failed password for invalid user danb from 139.99.37.130 port 40456 ssh2 |
2019-11-03 00:32:27 |
139.99.37.130 | attack | Oct 18 03:52:56 work-partkepr sshd\[16929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 user=root Oct 18 03:52:57 work-partkepr sshd\[16929\]: Failed password for root from 139.99.37.130 port 2472 ssh2 ... |
2019-10-18 14:45:39 |
139.99.37.130 | attackbotsspam | Oct 13 20:51:10 nandi sshd[28138]: Failed password for r.r from 139.99.37.130 port 63452 ssh2 Oct 13 20:51:10 nandi sshd[28138]: Received disconnect from 139.99.37.130: 11: Bye Bye [preauth] Oct 13 21:14:17 nandi sshd[20327]: Failed password for r.r from 139.99.37.130 port 61756 ssh2 Oct 13 21:14:17 nandi sshd[20327]: Received disconnect from 139.99.37.130: 11: Bye Bye [preauth] Oct 13 21:20:19 nandi sshd[26326]: Failed password for r.r from 139.99.37.130 port 34244 ssh2 Oct 13 21:20:19 nandi sshd[26326]: Received disconnect from 139.99.37.130: 11: Bye Bye [preauth] Oct 13 21:26:10 nandi sshd[1507]: Failed password for r.r from 139.99.37.130 port 6720 ssh2 Oct 13 21:26:10 nandi sshd[1507]: Received disconnect from 139.99.37.130: 11: Bye Bye [preauth] Oct 13 21:31:54 nandi sshd[7816]: Failed password for r.r from 139.99.37.130 port 43176 ssh2 Oct 13 21:31:55 nandi sshd[7816]: Received disconnect from 139.99.37.130: 11: Bye Bye [preauth] Oct 13 21:37:31 nandi sshd[14021]:........ ------------------------------- |
2019-10-14 18:55:09 |
139.99.37.134 | attackbots | Oct 13 17:07:43 sauna sshd[160889]: Failed password for root from 139.99.37.134 port 56616 ssh2 ... |
2019-10-13 22:34:16 |
139.99.37.134 | attackbotsspam | Oct 11 06:10:53 localhost sshd\[35407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.134 user=root Oct 11 06:10:54 localhost sshd\[35407\]: Failed password for root from 139.99.37.134 port 38946 ssh2 Oct 11 06:16:16 localhost sshd\[35639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.134 user=root Oct 11 06:16:18 localhost sshd\[35639\]: Failed password for root from 139.99.37.134 port 50580 ssh2 Oct 11 06:21:43 localhost sshd\[35848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.134 user=root ... |
2019-10-11 14:22:49 |
139.99.37.134 | attackspambots | SSH bruteforce |
2019-10-05 23:02:28 |
139.99.37.130 | attack | 2019-08-23 17:03:29,038 fail2ban.actions [878]: NOTICE [sshd] Ban 139.99.37.130 2019-08-23 20:14:57,802 fail2ban.actions [878]: NOTICE [sshd] Ban 139.99.37.130 2019-08-23 23:24:35,283 fail2ban.actions [878]: NOTICE [sshd] Ban 139.99.37.130 ... |
2019-10-03 15:12:32 |
139.99.37.130 | attackbotsspam | Sep 29 02:08:08 aat-srv002 sshd[3866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Sep 29 02:08:10 aat-srv002 sshd[3866]: Failed password for invalid user hy123 from 139.99.37.130 port 15394 ssh2 Sep 29 02:12:15 aat-srv002 sshd[4010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Sep 29 02:12:18 aat-srv002 sshd[4010]: Failed password for invalid user fernanda123 from 139.99.37.130 port 52164 ssh2 ... |
2019-09-29 16:54:01 |
139.99.37.130 | attackspam | Sep 27 23:00:10 microserver sshd[12401]: Invalid user system from 139.99.37.130 port 1658 Sep 27 23:00:10 microserver sshd[12401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Sep 27 23:00:12 microserver sshd[12401]: Failed password for invalid user system from 139.99.37.130 port 1658 ssh2 Sep 27 23:05:17 microserver sshd[13240]: Invalid user fcube from 139.99.37.130 port 38368 Sep 27 23:05:17 microserver sshd[13240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Sep 27 23:18:49 microserver sshd[14857]: Invalid user system from 139.99.37.130 port 20512 Sep 27 23:18:49 microserver sshd[14857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Sep 27 23:18:51 microserver sshd[14857]: Failed password for invalid user system from 139.99.37.130 port 20512 ssh2 Sep 27 23:23:26 microserver sshd[15550]: Invalid user skyrix from 139.99.37.130 port 57210 Se |
2019-09-28 06:27:38 |
139.99.37.130 | attack | Sep 25 06:12:43 SilenceServices sshd[9243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Sep 25 06:12:45 SilenceServices sshd[9243]: Failed password for invalid user 123 from 139.99.37.130 port 34802 ssh2 Sep 25 06:16:33 SilenceServices sshd[10253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 |
2019-09-25 12:35:53 |
139.99.37.130 | attack | Sep 24 08:32:18 markkoudstaal sshd[32291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Sep 24 08:32:20 markkoudstaal sshd[32291]: Failed password for invalid user ftp from 139.99.37.130 port 7052 ssh2 Sep 24 08:37:03 markkoudstaal sshd[32743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 |
2019-09-24 14:48:00 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.37.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.99.37.157. IN A
;; AUTHORITY SECTION:
. 329 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019091902 1800 900 604800 86400
;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 20 08:38:55 CST 2019
;; MSG SIZE rcvd: 117
157.37.99.139.in-addr.arpa domain name pointer ip157.ip-139-99-37.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
157.37.99.139.in-addr.arpa name = ip157.ip-139-99-37.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.143.220.46 | attackspam | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2019-11-22 03:13:41 |
45.91.225.80 | attackspam | 45.91.225.80 was recorded 14 times by 13 hosts attempting to connect to the following ports: 3306. Incident counter (4h, 24h, all-time): 14, 22, 62 |
2019-11-22 03:21:40 |
165.22.101.190 | attackbots | " " |
2019-11-22 03:20:37 |
118.169.41.118 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-22 03:10:06 |
87.236.20.167 | attackspambots | xmlrpc attack |
2019-11-22 03:18:18 |
110.37.218.179 | attack | 11/21/2019-15:50:38.961811 110.37.218.179 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-11-22 03:12:40 |
207.154.193.178 | attackbots | Nov 21 15:38:17 ns382633 sshd\[25515\]: Invalid user larheim from 207.154.193.178 port 47710 Nov 21 15:38:17 ns382633 sshd\[25515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.193.178 Nov 21 15:38:19 ns382633 sshd\[25515\]: Failed password for invalid user larheim from 207.154.193.178 port 47710 ssh2 Nov 21 15:50:32 ns382633 sshd\[28022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.193.178 user=root Nov 21 15:50:34 ns382633 sshd\[28022\]: Failed password for root from 207.154.193.178 port 44298 ssh2 |
2019-11-22 03:15:39 |
94.203.254.248 | attack | Nov 21 09:50:27 www sshd\[23572\]: Invalid user pi from 94.203.254.248 Nov 21 09:50:27 www sshd\[23573\]: Invalid user pi from 94.203.254.248 ... |
2019-11-22 03:27:22 |
181.48.28.13 | attack | Nov 21 21:25:42 areeb-Workstation sshd[18988]: Failed password for backup from 181.48.28.13 port 52716 ssh2 Nov 21 21:29:39 areeb-Workstation sshd[19751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13 ... |
2019-11-22 03:14:11 |
177.207.249.96 | attackspambots | MAIL: User Login Brute Force Attempt |
2019-11-22 02:56:32 |
103.86.182.89 | attackspambots | xmlrpc attack |
2019-11-22 02:50:06 |
201.209.246.45 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 21-11-2019 14:50:29. |
2019-11-22 03:26:03 |
207.241.167.7 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 21-11-2019 14:50:30. |
2019-11-22 03:23:59 |
103.56.113.69 | attackbotsspam | Nov 21 06:06:05 tdfoods sshd\[9408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69 user=root Nov 21 06:06:07 tdfoods sshd\[9408\]: Failed password for root from 103.56.113.69 port 58385 ssh2 Nov 21 06:10:16 tdfoods sshd\[9843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.113.69 user=root Nov 21 06:10:18 tdfoods sshd\[9843\]: Failed password for root from 103.56.113.69 port 48151 ssh2 Nov 21 06:14:32 tdfoods sshd\[10156\]: Invalid user dbus from 103.56.113.69 |
2019-11-22 03:01:45 |
3.91.158.98 | attackbotsspam | 21.11.2019 15:50:43 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter |
2019-11-22 03:17:07 |