Loading IP search...
A type of cyberattack in which the attacker collects stolen account credentials, typically consisting of lists of usernames or email addresses and the corresponding passwords (often from a data breach), and then uses the credentials to gain unauthorized access to user accounts on other systems through large-scale automated login requests directed against a web application.
Port / Service: 22
Protocol: TCP
Sensor Count: 2
Hits: 246
Last Seen: 2024-04-22T01:00:13.075Z
Port / Service: 2222
Protocol: TCP
Sensor Count: 2
Hits: 53
Last Seen: 2024-04-22T01:00:10.681Z
Sensor Count: 114
Hits: 2,831
Last Seen:2023-02-08T14:17:09.940Z
Port: 3914
Protocol: TCP
Service: listcrt-port-2
Port: 5052
Protocol: TCP
Service: ita-manager
Port: 1038
Protocol: TCP
Service: mtqp
Port: 9388
Protocol: TCP
Service: d2ddatatrans
Port: 9134
Protocol: TCP
Service: -
Port: 5028
Protocol: TCP
Service: qvr
Port: 4846
Protocol: TCP
Service: contamac_icm
Port: 4888
Protocol: TCP
Service: xcap-portal
Port: 2213
Protocol: TCP
Service: kali
Port: 3804
Protocol: TCP
Service: iqnet-port
| IP Address β² | Hits | First Seen (UTC) | Last Seen (UTC) |
|---|---|---|---|
| 139.59.104.0β | 6 | 2025-01-24T20:07:40.619Z | 2025-01-24T20:07:44.724Z |
| 139.59.104.8β | 18 | 2023-08-09T17:22:36.443Z | 2023-08-09T17:22:43.581Z |
| 139.59.104.16β | 2 | 2024-09-21T10:55:06.445Z | 2024-09-22T00:15:26.148Z |
| 139.59.104.29β | 18 | 2024-02-13T12:57:47.638Z | 2024-02-13T12:57:55.000Z |
| 139.59.104.30β | 106 | 2022-03-27T03:53:07.800Z | 2022-03-29T12:26:00.289Z |
| 139.59.104.32β | 737 | 2022-05-21T23:18:48.542Z | 2022-11-01T11:36:01.205Z |
| 139.59.104.33β | 2 | 2024-07-18T06:03:14.471Z | 2024-07-18T06:24:08.225Z |
| 139.59.104.34β | 1 | 2026-04-21T11:48:56.444Z | 2026-04-21T11:48:56.444Z |
| 139.59.104.39β | 9 | 2021-06-12T15:45:13.918Z | 2021-06-15T23:32:26.193Z |
| 139.59.104.46β | 1 | 2024-09-23T13:22:11.275Z | 2024-09-23T13:22:11.275Z |
Page 1 of 6