City: unknown
Region: unknown
Country: China
Internet Service Provider: ChinaNet Guangdong Province Network
Hostname: unknown
Organization: unknown
Usage Type: unknown
| Type | Details | Datetime |
|---|---|---|
| attack | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-10-13 22:24:34 |
| attackbots | 2020-10-13T04:14:10.613671mail0 sshd[11943]: Invalid user yasuda from 14.29.162.139 port 20690 2020-10-13T04:14:12.268650mail0 sshd[11943]: Failed password for invalid user yasuda from 14.29.162.139 port 20690 ssh2 2020-10-13T04:18:30.602255mail0 sshd[12330]: User root from 14.29.162.139 not allowed because not listed in AllowUsers ... |
2020-10-13 13:47:56 |
| attackbots | Oct 13 00:03:09 srv-ubuntu-dev3 sshd[35162]: Invalid user rf from 14.29.162.139 Oct 13 00:03:09 srv-ubuntu-dev3 sshd[35162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 Oct 13 00:03:09 srv-ubuntu-dev3 sshd[35162]: Invalid user rf from 14.29.162.139 Oct 13 00:03:11 srv-ubuntu-dev3 sshd[35162]: Failed password for invalid user rf from 14.29.162.139 port 21690 ssh2 Oct 13 00:05:48 srv-ubuntu-dev3 sshd[35453]: Invalid user hara from 14.29.162.139 Oct 13 00:05:48 srv-ubuntu-dev3 sshd[35453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 Oct 13 00:05:48 srv-ubuntu-dev3 sshd[35453]: Invalid user hara from 14.29.162.139 Oct 13 00:05:50 srv-ubuntu-dev3 sshd[35453]: Failed password for invalid user hara from 14.29.162.139 port 64058 ssh2 Oct 13 00:08:25 srv-ubuntu-dev3 sshd[35831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 ... |
2020-10-13 06:31:53 |
| attackbotsspam | (sshd) Failed SSH login from 14.29.162.139 (CN/China/-): 5 in the last 3600 secs |
2020-10-07 03:55:42 |
| attack | Automatic report - Banned IP Access |
2020-10-06 19:57:00 |
| attackbots | Aug 3 16:23:40 pornomens sshd\[20210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=root Aug 3 16:23:42 pornomens sshd\[20210\]: Failed password for root from 14.29.162.139 port 34680 ssh2 Aug 3 16:27:15 pornomens sshd\[20212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=root ... |
2020-08-04 00:01:15 |
| attackspam | Jul 30 16:04:17 rotator sshd\[5452\]: Invalid user yuxuan from 14.29.162.139Jul 30 16:04:19 rotator sshd\[5452\]: Failed password for invalid user yuxuan from 14.29.162.139 port 24738 ssh2Jul 30 16:08:20 rotator sshd\[6236\]: Invalid user zoumin from 14.29.162.139Jul 30 16:08:22 rotator sshd\[6236\]: Failed password for invalid user zoumin from 14.29.162.139 port 12381 ssh2Jul 30 16:12:40 rotator sshd\[7050\]: Invalid user zuoxl from 14.29.162.139Jul 30 16:12:41 rotator sshd\[7050\]: Failed password for invalid user zuoxl from 14.29.162.139 port 56529 ssh2 ... |
2020-07-31 03:04:56 |
| attackspam | Jul 23 04:22:07 firewall sshd[12612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 Jul 23 04:22:07 firewall sshd[12612]: Invalid user zhangx from 14.29.162.139 Jul 23 04:22:09 firewall sshd[12612]: Failed password for invalid user zhangx from 14.29.162.139 port 45884 ssh2 ... |
2020-07-23 17:23:00 |
| attackbots | Jul 21 07:00:22 vps639187 sshd\[5999\]: Invalid user fgs from 14.29.162.139 port 39285 Jul 21 07:00:22 vps639187 sshd\[5999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 Jul 21 07:00:24 vps639187 sshd\[5999\]: Failed password for invalid user fgs from 14.29.162.139 port 39285 ssh2 ... |
2020-07-21 13:54:58 |
| attack | Jun 24 06:17:08 plex sshd[14562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=root Jun 24 06:17:09 plex sshd[14562]: Failed password for root from 14.29.162.139 port 35333 ssh2 |
2020-06-24 16:28:40 |
| attackbotsspam | Jun 14 08:13:40 srv-ubuntu-dev3 sshd[42054]: Invalid user wade from 14.29.162.139 Jun 14 08:13:40 srv-ubuntu-dev3 sshd[42054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 Jun 14 08:13:40 srv-ubuntu-dev3 sshd[42054]: Invalid user wade from 14.29.162.139 Jun 14 08:13:42 srv-ubuntu-dev3 sshd[42054]: Failed password for invalid user wade from 14.29.162.139 port 21496 ssh2 Jun 14 08:17:35 srv-ubuntu-dev3 sshd[42684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=root Jun 14 08:17:37 srv-ubuntu-dev3 sshd[42684]: Failed password for root from 14.29.162.139 port 59034 ssh2 Jun 14 08:21:08 srv-ubuntu-dev3 sshd[43292]: Invalid user pbcte from 14.29.162.139 Jun 14 08:21:08 srv-ubuntu-dev3 sshd[43292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 Jun 14 08:21:08 srv-ubuntu-dev3 sshd[43292]: Invalid user pbcte from 14.29.162 ... |
2020-06-14 17:57:30 |
| attack | 20 attempts against mh-ssh on cloud |
2020-06-05 15:45:38 |
| attackspambots | SSH bruteforce |
2020-06-03 19:11:20 |
| attack | Jun 2 13:58:24 dignus sshd[15694]: Failed password for root from 14.29.162.139 port 14423 ssh2 Jun 2 13:59:50 dignus sshd[15853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=root Jun 2 13:59:52 dignus sshd[15853]: Failed password for root from 14.29.162.139 port 38279 ssh2 Jun 2 14:01:20 dignus sshd[16012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=root Jun 2 14:01:22 dignus sshd[16012]: Failed password for root from 14.29.162.139 port 62133 ssh2 ... |
2020-06-03 05:09:04 |
| attackspambots | May 31 07:18:19 pi sshd[9435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 May 31 07:18:21 pi sshd[9435]: Failed password for invalid user ftp from 14.29.162.139 port 62289 ssh2 |
2020-05-31 18:18:51 |
| attackbotsspam | May 24 06:55:23 ajax sshd[27327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 May 24 06:55:25 ajax sshd[27327]: Failed password for invalid user zds from 14.29.162.139 port 39434 ssh2 |
2020-05-24 14:26:39 |
| attack | Invalid user gp from 14.29.162.139 port 44463 |
2020-04-22 01:51:27 |
| attackbotsspam | Mar 24 20:44:19 host sshd[56365]: Invalid user january from 14.29.162.139 port 42967 ... |
2020-03-25 08:46:09 |
| attack | Feb 13 06:46:11 haigwepa sshd[18907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 Feb 13 06:46:14 haigwepa sshd[18907]: Failed password for invalid user sven from 14.29.162.139 port 18408 ssh2 ... |
2020-02-13 17:01:33 |
| attackspam | 2020-02-10T02:52:00.4438951495-001 sshd[17367]: Invalid user tfc from 14.29.162.139 port 59047 2020-02-10T02:52:00.4472261495-001 sshd[17367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 2020-02-10T02:52:00.4438951495-001 sshd[17367]: Invalid user tfc from 14.29.162.139 port 59047 2020-02-10T02:52:02.5404251495-001 sshd[17367]: Failed password for invalid user tfc from 14.29.162.139 port 59047 ssh2 2020-02-10T02:54:21.9953991495-001 sshd[17453]: Invalid user zty from 14.29.162.139 port 17704 2020-02-10T02:54:21.9991261495-001 sshd[17453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 2020-02-10T02:54:21.9953991495-001 sshd[17453]: Invalid user zty from 14.29.162.139 port 17704 2020-02-10T02:54:24.1171191495-001 sshd[17453]: Failed password for invalid user zty from 14.29.162.139 port 17704 ssh2 2020-02-10T02:56:53.6205001495-001 sshd[17578]: Invalid user uqc from 14.29.162. ... |
2020-02-10 19:14:21 |
| attackbotsspam | $f2bV_matches |
2020-01-11 23:30:04 |
| attackspambots | Dec 22 17:50:23 woltan sshd[7800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 |
2019-12-23 01:41:50 |
| attackbotsspam | Dec 18 07:27:07 ns41 sshd[799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 |
2019-12-18 18:46:20 |
| attack | Dec 16 03:46:39 linuxvps sshd\[55467\]: Invalid user kenmouse from 14.29.162.139 Dec 16 03:46:39 linuxvps sshd\[55467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 Dec 16 03:46:41 linuxvps sshd\[55467\]: Failed password for invalid user kenmouse from 14.29.162.139 port 64384 ssh2 Dec 16 03:51:58 linuxvps sshd\[58904\]: Invalid user pro2 from 14.29.162.139 Dec 16 03:51:58 linuxvps sshd\[58904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 |
2019-12-16 17:53:18 |
| attackspambots | Dec 12 16:26:03 DAAP sshd[23292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=games Dec 12 16:26:06 DAAP sshd[23292]: Failed password for games from 14.29.162.139 port 13458 ssh2 Dec 12 16:34:26 DAAP sshd[23383]: Invalid user tbdb from 14.29.162.139 port 18317 ... |
2019-12-13 03:01:23 |
| attackbotsspam | 2019-12-06T06:39:24.305520shield sshd\[3905\]: Invalid user chun-lin from 14.29.162.139 port 10669 2019-12-06T06:39:24.309997shield sshd\[3905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 2019-12-06T06:39:26.530355shield sshd\[3905\]: Failed password for invalid user chun-lin from 14.29.162.139 port 10669 ssh2 2019-12-06T06:46:05.149314shield sshd\[5662\]: Invalid user waugaman from 14.29.162.139 port 15330 2019-12-06T06:46:05.153463shield sshd\[5662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 |
2019-12-06 18:27:28 |
| attackspambots | Nov 27 11:46:26 vps46666688 sshd[28894]: Failed password for root from 14.29.162.139 port 56266 ssh2 Nov 27 11:51:50 vps46666688 sshd[29088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 ... |
2019-11-28 02:05:38 |
| attackbots | Automatic report - Banned IP Access |
2019-11-23 22:14:30 |
| attackspam | 2019-11-18T16:36:40.5434291495-001 sshd\[37016\]: Failed password for invalid user diuble from 14.29.162.139 port 53593 ssh2 2019-11-18T17:37:52.7193411495-001 sshd\[39143\]: Invalid user book from 14.29.162.139 port 17685 2019-11-18T17:37:52.7275181495-001 sshd\[39143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 2019-11-18T17:37:55.5883731495-001 sshd\[39143\]: Failed password for invalid user book from 14.29.162.139 port 17685 ssh2 2019-11-18T17:42:08.9934001495-001 sshd\[39297\]: Invalid user iloveyou from 14.29.162.139 port 52973 2019-11-18T17:42:08.9994931495-001 sshd\[39297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 ... |
2019-11-19 08:20:04 |
| attackspambots | Nov 11 09:23:21 v22018076622670303 sshd\[27755\]: Invalid user hung from 14.29.162.139 port 13066 Nov 11 09:23:21 v22018076622670303 sshd\[27755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 Nov 11 09:23:23 v22018076622670303 sshd\[27755\]: Failed password for invalid user hung from 14.29.162.139 port 13066 ssh2 ... |
2019-11-11 20:11:15 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.29.162.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57985
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.29.162.139. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019091601 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 17 06:54:35 CST 2019
;; MSG SIZE rcvd: 117
Host 139.162.29.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 139.162.29.14.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 211.144.114.26 | attackbots | Invalid user bryed from 211.144.114.26 port 54840 |
2019-12-29 01:43:11 |
| 73.111.217.3 | attackspambots | Unauthorized connection attempt detected from IP address 73.111.217.3 to port 23 |
2019-12-29 01:10:27 |
| 186.103.163.26 | attack | Unauthorized connection attempt detected from IP address 186.103.163.26 to port 80 |
2019-12-29 01:25:05 |
| 152.115.62.241 | attack | Unauthorized connection attempt detected from IP address 152.115.62.241 to port 445 |
2019-12-29 01:53:42 |
| 99.83.2.241 | attackspambots | Unauthorized connection attempt detected from IP address 99.83.2.241 to port 23 |
2019-12-29 01:30:33 |
| 181.118.123.12 | attackspam | Unauthorized connection attempt detected from IP address 181.118.123.12 to port 5358 |
2019-12-29 01:52:49 |
| 206.10.30.10 | attackspam | Unauthorized connection attempt detected from IP address 206.10.30.10 to port 445 |
2019-12-29 01:44:30 |
| 54.153.108.110 | attackspam | Unauthorized connection attempt detected from IP address 54.153.108.110 to port 8984 |
2019-12-29 01:11:28 |
| 189.19.176.64 | attackbotsspam | Unauthorized connection attempt detected from IP address 189.19.176.64 to port 80 |
2019-12-29 01:50:01 |
| 149.34.19.111 | attackbotsspam | Unauthorized connection attempt detected from IP address 149.34.19.111 to port 5555 |
2019-12-29 01:27:11 |
| 196.52.43.114 | attackbots | Unauthorized connection attempt detected from IP address 196.52.43.114 to port 138 |
2019-12-29 01:19:18 |
| 217.208.89.186 | attackbotsspam | Unauthorized connection attempt detected from IP address 217.208.89.186 to port 22 |
2019-12-29 01:42:49 |
| 54.191.117.231 | attackbotsspam | Unauthorized connection attempt detected from IP address 54.191.117.231 to port 5431 |
2019-12-29 01:38:25 |
| 80.210.19.183 | attack | Unauthorized connection attempt detected from IP address 80.210.19.183 to port 81 |
2019-12-29 01:08:57 |
| 64.66.23.226 | attackspam | Unauthorized connection attempt detected from IP address 64.66.23.226 to port 8080 |
2019-12-29 01:37:50 |