Loading IP search...
A type of cyberattack in which the attacker collects stolen account credentials, typically consisting of lists of usernames or email addresses and the corresponding passwords (often from a data breach), and then uses the credentials to gain unauthorized access to user accounts on other systems through large-scale automated login requests directed against a web application.
Port / Service: 22
Protocol: TCP
Sensor Count: 2
Hits: 1,237,180
Last Seen: 2026-02-07T03:00:57.425Z
Port / Service: 2222
Protocol: TCP
Sensor Count: 2
Hits: 309,282
Last Seen: 2026-02-07T03:00:55.833Z
Sensor Count: 156
Hits: 255
Last Seen:2026-01-18T18:02:48.552Z
Port: 27021
Protocol: UDP
Service: -
Port: 15322
Protocol: TCP
Service: -
Port: 15822
Protocol: TCP
Service: -
Port: 15522
Protocol: TCP
Service: -
Port: 15622
Protocol: TCP
Service: -
Port: 15722
Protocol: TCP
Service: -
Port: 15422
Protocol: TCP
Service: -
Port: 15922
Protocol: TCP
Service: -
Port: 16022
Protocol: TCP
Service: -
Port: 15222
Protocol: TCP
Service: -
| IP Address β² | Hits | First Seen (UTC) | Last Seen (UTC) |
|---|---|---|---|
| 139.162.148.4β | 13 | 2025-01-19T12:28:02.594Z | 2025-01-19T12:28:11.424Z |
| 139.162.148.16β | 1 | 2021-09-29T03:56:26.079Z | 2021-09-29T03:56:26.079Z |
| 139.162.148.27β | 5 | 2019-03-31T20:29:12.142Z | 2019-03-31T20:29:13.093Z |
| 139.162.148.36β | 2 | 2017-04-23T21:37:17.362Z | 2017-04-23T21:38:19.533Z |
| 139.162.148.41β | 1 | 2026-02-25T20:24:39.233Z | 2026-02-25T20:24:39.233Z |
| 139.162.148.42β | 153 | 2025-08-21T03:13:28.080Z | 2025-08-22T01:27:42.021Z |
| 139.162.148.43β | 1 | 2024-09-29T08:27:44.571Z | 2024-09-29T08:27:44.571Z |
| 139.162.148.44β | 3 | 2025-08-05T07:07:41.231Z | 2025-08-05T07:07:41.231Z |
| 139.162.148.50β | 8 | 2017-09-02T21:37:12.191Z | 2017-10-03T21:02:25.849Z |
| 139.162.148.54β | 5 | 2022-02-15T00:28:40.998Z | 2022-02-15T10:01:01.963Z |
Page 1 of 4