Go
196.1.99.12
is a
Hacker
100 %
Senegal
Report Abuse
1021attacks reported
760Brute-ForceSSH
91Brute-Force
58SSH
27HackingBrute-ForceSSH
16FTP Brute-Force
15HackingBrute-Force
12Web App Attack
12Port Scan
9uncategorized
5Port ScanSSH
...
1reputation reported
1uncategorized
1abuse reported
1Email Spam
from 118 distinct reporters
and 11 distinct sources : BadIPs.com, Blocklist.de, danger.rulez.sk, darklist.de, Emerging Threats, FireHOL, NormShield.com, VoIPBL.org, blocklist.net.ua, Charles Haley, AbuseIPDB
196.1.99.12 was first signaled at 2019-03-04 03:18 and last record was at 2019-08-26 11:18.
IP

196.1.99.12

Organization
Universite Saint-Louis du Senegal
Localisation
Senegal
Saint-Louis, Saint-louis
NetRange : First & Last IP
196.1.99.0 - 196.1.99.255
Network CIDR
196.1.99.0/24

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-07-08 09:38 attacks Brute-Force AbuseIPDB Jul 8 18:54:56 herz-der-gamer sshd[27540]: Invalid user teamspeak1 from 196.1.99.12 port 53245
2019-07-08 08:25 attacks Brute-ForceSSH AbuseIPDB Triggered by Fail2Ban at Vostok web server
2019-07-08 07:11 attacks Brute-Force AbuseIPDB " "
2019-07-08 07:06 attacks Brute-Force AbuseIPDB Brute force SMTP login attempted.
2019-07-08 05:40 attacks HackingBrute-Force AbuseIPDB IP attempted unauthorised action
2019-07-08 05:20 attacks Brute-ForceSSH AbuseIPDB Jul 8 16:20:10 pornomens sshd\[10089\]: Invalid user patalano from 196.1.99.12 port 51444 Jul 8 16:20:11 pornomens sshd\[10089\]: pam_unix\(sshd:auth\
2019-07-08 05:02 attacks Brute-ForceSSH AbuseIPDB vps1:sshd-InvalidUser
2019-07-08 04:02 attacks HackingBrute-ForceSSH AbuseIPDB Jul 8 12:25:15 XXX sshd[8964]: Invalid user iony from 196.1.99.12 port 37994
2019-07-08 03:45 attacks Brute-ForceSSH AbuseIPDB SSH Brute-Force reported by Fail2Ban
2019-07-08 03:27 attacks Brute-ForceSSH AbuseIPDB 2019-07-08T12:27:51.160664abusebot-7.cloudsearch.cf sshd\[16365\]: Invalid user iony from 196.1.99.12 port 51370
2019-07-07 07:50 attacks Brute-ForceSSH AbuseIPDB Jul 7 18:50:34 icinga sshd[7968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12 Jul 7 18:50:36 i
2019-07-07 07:39 attacks Brute-ForceSSH AbuseIPDB SSH invalid-user multiple login attempts
2019-07-07 07:16 attacks Brute-ForceSSH AbuseIPDB Jul 7 16:16:28 MK-Soft-VM4 sshd\[19253\]: Invalid user rose from 196.1.99.12 port 38579 Jul 7 16:16:28 MK-Soft-VM4 sshd\[19253\]: pam_unix\(sshd:auth\
2019-07-07 07:07 attacks Brute-ForceSSH AbuseIPDB 2019-07-07T18:07:02.775758scmdmz1 sshd\[4474\]: Invalid user gmalloy from 196.1.99.12 port 60198 2019-07-07T18:07:02.778703scmdmz1 sshd\[4474\]: pam_u
2019-07-07 06:10 attacks Brute-ForceSSH AbuseIPDB Jul 7 16:10:11 mail sshd\[16227\]: Invalid user upload from 196.1.99.12 port 60622 Jul 7 16:10:11 mail sshd\[16227\]: pam_unix\(sshd:auth\): authentic
2019-07-07 05:13 attacks Brute-ForceSSH AbuseIPDB Jul 7 16:13:15 core01 sshd\[13650\]: Invalid user gregory from 196.1.99.12 port 50931 Jul 7 16:13:15 core01 sshd\[13650\]: pam_unix\(sshd:auth\): auth
2019-07-07 04:00 attacks Brute-ForceSSH AbuseIPDB 2019-07-07T12:59:43.414117abusebot.cloudsearch.cf sshd\[20064\]: Invalid user norm from 196.1.99.12 port 33269
2019-07-07 03:53 attacks HackingBrute-ForceSSH AbuseIPDB SSH authentication failure x 6 reported by Fail2Ban
2019-07-07 03:23 attacks Brute-ForceSSH AbuseIPDB  
2019-07-07 03:17 attacks Brute-ForceSSH AbuseIPDB Jul 7 15:17:24 srv-4 sshd\[9475\]: Invalid user test from 196.1.99.12 Jul 7 15:17:24 srv-4 sshd\[9475\]: pam_unix\(sshd:auth\): authentication failure
2019-07-07 02:59 attacks Brute-ForceSSH AbuseIPDB 2019-07-07T11:59:27.821035abusebot-4.cloudsearch.cf sshd\[19923\]: Invalid user leica from 196.1.99.12 port 59868
2019-07-07 01:24 attacks Brute-ForceSSH AbuseIPDB 2019-07-07T12:24:00.521603centos sshd\[20842\]: Invalid user john from 196.1.99.12 port 52916 2019-07-07T12:24:00.529121centos sshd\[20842\]: pam_unix
2019-07-07 01:05 attacks Brute-ForceSSH AbuseIPDB Jul 5 16:40:16 tuxlinux sshd[61122]: Invalid user cod from 196.1.99.12 port 40353 Jul 5 16:40:16 tuxlinux sshd[61122]: pam_unix(sshd:auth): authentica
2019-07-07 00:31 attacks Brute-ForceSSH AbuseIPDB Jul 7 09:31:06 MK-Soft-VM3 sshd\[11275\]: Invalid user liferay from 196.1.99.12 port 33887 Jul 7 09:31:06 MK-Soft-VM3 sshd\[11275\]: pam_unix\(sshd:au
2019-07-06 23:59 attacks SSH AbuseIPDB Jul 6 22:46:59 [munged] sshd[1244]: Invalid user c&a from 196.1.99.12 port 40358 Jul 6 22:46:59 [munged] sshd[1244]: pam_unix(sshd:auth): authenti
2019-07-06 21:38 attacks Brute-ForceSSH AbuseIPDB Jul 7 08:38:06 rpi sshd[10733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12 Jul 7 08:38:08 rp
2019-07-06 20:02 attacks Brute-ForceSSH AbuseIPDB Jul 7 07:02:10 srv206 sshd[14292]: Invalid user test from 196.1.99.12 Jul 7 07:02:10 srv206 sshd[14292]: pam_unix(sshd:auth): authentication failure;
2019-07-06 19:38 attacks Brute-ForceSSH AbuseIPDB Jul 7 06:38:33 jane sshd\[26117\]: Invalid user text from 196.1.99.12 port 39222 Jul 7 06:38:33 jane sshd\[26117\]: pam_unix\(sshd:auth\): authenticat
2019-07-06 18:05 attacks Brute-ForceSSH AbuseIPDB Jul 7 05:05:32 ncomp sshd[15676]: Invalid user topic from 196.1.99.12 Jul 7 05:05:32 ncomp sshd[15676]: pam_unix(sshd:auth): authentication failure; l
2019-07-06 16:48 attacks Brute-ForceSSH AbuseIPDB Jul 7 02:48:41 localhost sshd\[59481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12 user=ro
2019-07-06 15:42 attacks Brute-ForceSSH AbuseIPDB Jul 6 17:42:48 cac1d2 sshd\[26581\]: Invalid user inc0metax from 196.1.99.12 port 52082 Jul 6 17:42:48 cac1d2 sshd\[26581\]: pam_unix\(sshd:auth\): au
2019-07-06 14:43 attacks Brute-ForceSSH AbuseIPDB Jul 7 01:43:36 icinga sshd[5175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12 Jul 7 01:43:37 i
2019-07-06 13:52 attacks Brute-ForceSSH AbuseIPDB Jul 6 23:51:52 localhost sshd\[45570\]: Invalid user bert from 196.1.99.12 port 33263 Jul 6 23:51:52 localhost sshd\[45570\]: pam_unix\(sshd:auth\): a
2019-07-06 12:20 attacks Brute-ForceSSH AbuseIPDB Jul 6 23:19:59 dev sshd\[1971\]: Invalid user magic from 196.1.99.12 port 50565 Jul 6 23:19:59 dev sshd\[1971\]: pam_unix\(sshd:auth\): authentication
2019-07-06 11:47 attacks SSH AbuseIPDB Jul 6 22:46:59 [munged] sshd[1244]: Invalid user c&a from 196.1.99.12 port 40358 Jul 6 22:46:59 [munged] sshd[1244]: pam_unix(sshd:auth): authenti
2019-07-06 10:53 attacks Brute-ForceSSH AbuseIPDB  
2019-07-06 10:48 attacks Brute-ForceSSH AbuseIPDB Triggered by Fail2Ban
2019-07-06 10:45 attacks Brute-ForceSSH AbuseIPDB  
2019-07-06 10:16 attacks Brute-ForceSSH AbuseIPDB 2019-07-06T19:16:00.445734abusebot-3.cloudsearch.cf sshd\[11090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser
2019-07-06 10:08 attacks Brute-ForceSSH AbuseIPDB Jul 6 20:08:22 debian sshd\[13007\]: Invalid user hacker from 196.1.99.12 port 56970 Jul 6 20:08:22 debian sshd\[13007\]: pam_unix\(sshd:auth\): authe
2019-07-06 08:58 attacks Brute-ForceSSH AbuseIPDB Jul 6 19:58:31 srv03 sshd\[24398\]: Invalid user ashley from 196.1.99.12 port 50779 Jul 6 19:58:31 srv03 sshd\[24398\]: pam_unix\(sshd:auth\): authent
2019-07-06 06:46 attacks Brute-ForceSSH AbuseIPDB  
2019-07-06 06:28 attacks SSH AbuseIPDB Jul 6 15:28:38 thevastnessof sshd[13479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12
2019-07-06 05:28 attacks Web App Attack AbuseIPDB Automatic report - Web App Attack
2019-07-06 05:04 attacks Brute-ForceSSH AbuseIPDB Jul 6 17:04:45 srv-4 sshd\[16117\]: Invalid user tasha from 196.1.99.12 Jul 6 17:04:45 srv-4 sshd\[16117\]: pam_unix\(sshd:auth\): authentication fail
2019-07-06 03:02 attacks Brute-ForceSSH AbuseIPDB Jul 6 12:01:10 MK-Soft-VM3 sshd\[22166\]: Invalid user petern from 196.1.99.12 port 44999 Jul 6 12:01:10 MK-Soft-VM3 sshd\[22166\]: pam_unix\(sshd:aut
2019-07-06 02:47 attacks Brute-ForceSSH AbuseIPDB Jul 6 13:47:26 dev sshd\[15824\]: Invalid user postgres from 196.1.99.12 port 38349 Jul 6 13:47:26 dev sshd\[15824\]: pam_unix\(sshd:auth\): authentic
2019-07-06 02:27 attacks Brute-ForceSSH AbuseIPDB 2019-07-06T11:27:02.243159abusebot-5.cloudsearch.cf sshd\[7977\]: Invalid user lil from 196.1.99.12 port 34877
2019-07-06 01:50 attacks Brute-ForceSSH AbuseIPDB SSH bruteforce (Triggered fail2ban)
2019-07-05 23:48 attacks Brute-ForceSSH AbuseIPDB Triggered by Fail2Ban at Vostok web server
2019-03-04 03:18 attacks SSH AbuseIPDB  
2019-03-04 03:32 attacks Port ScanHackingExploited Host AbuseIPDB Trying ports that it shouldn't be.
2019-03-04 03:46 attacks Brute-Force AbuseIPDB Mar 4 13:46:35 ms-srv sshd[45537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.99.12 Mar 4 13:46:36
2019-03-04 04:43 attacks Port ScanBrute-ForceSSH AbuseIPDB $f2bV_matches
2019-03-04 05:56 attacks Brute-ForceSSH AbuseIPDB ssh failed login
2019-03-04 06:38 attacks Brute-ForceSSH AbuseIPDB Mar 4 17:38:50 vpn01 sshd\[7174\]: Invalid user test from 196.1.99.12 Mar 4 17:38:50 vpn01 sshd\[7174\]: pam_unix\(sshd:auth\): authentication failure
2019-03-04 07:17 attacks HackingBrute-ForceSSH AbuseIPDB SSH authentication failure x 6 reported by Fail2Ban
2019-03-04 07:54 attacks Brute-ForceSSH AbuseIPDB Mar 4 17:54:06 ***** sshd[2023]: Invalid user test from 196.1.99.12 port 48309
2019-03-04 08:42 attacks Brute-ForceSSH AbuseIPDB 2019-03-04T19:40:55.530556stark.klein-stark.info sshd\[28525\]: Invalid user test from 196.1.99.12 port 49740 2019-03-04T19:40:55.536326stark.klein-st
2019-03-04 10:12 attacks Brute-ForceSSH AbuseIPDB SSH Bruteforce Attack
2019-03-29 18:18 reputation bds_atif  
2019-03-29 18:19 attacks bi_any_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-03-29 18:21 attacks blocklist_de Blocklist.de  
2019-03-29 18:21 attacks SSH blocklist_de_ssh Blocklist.de  
2019-03-29 18:22 attacks Brute-Force bruteforceblocker danger.rulez.sk  
2019-03-29 18:23 attacks darklist_de darklist.de  
2019-03-29 18:24 attacks et_compromised Emerging Threats  
2019-03-29 18:27 attacks firehol_level2 FireHOL  
2019-03-29 18:27 attacks firehol_level3 FireHOL  
2019-05-28 23:19 attacks bi_default_0_1d BadIPs.com  
2019-05-28 23:19 attacks bi_unknown_0_1d BadIPs.com  
2019-05-28 23:37 attacks Brute-Force normshield_all_bruteforce NormShield.com  
2019-05-28 23:38 attacks Brute-Force normshield_high_bruteforce NormShield.com  
2019-05-28 23:46 attacks Fraud VoIP voipbl VoIPBL.org  
2019-05-30 09:29 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-05-30 09:29 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-06-03 22:45 abuse Email Spam blocklist_net_ua blocklist.net.ua  
2019-06-03 22:53 attacks firehol_level4 FireHOL  
2019-08-23 14:44 attacks SSH haley_ssh Charles Haley  
2019-08-26 11:18 attacks Brute-ForceFTP Brute-Force bi_ftp_0_1d BadIPs.com  
2019-08-26 11:18 attacks Brute-ForceFTP Brute-Force bi_proftpd_0_1d BadIPs.com  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 196.1.99.0 - 196.1.99.255
netname: NET-RIO-UNIV-STL
descr: Universite Saint-Louis du Senegal
descr: Saint-Louis
country: SN
org: ORG-USdS1-AFRINIC
admin-c: AC4-AFRINIC
tech-c: AC4-AFRINIC
status: ASSIGNED PI
mnt-by: AFRINIC-HM-MNT
mnt-lower: TF-196-1-99-MNT
mnt-domains: TF-196-1-99-MNT
source: AFRINIC # Filtered
parent: 196.0.0.0 - 196.255.255.255

organisation: ORG-USdS1-AFRINIC
org-name: Universite Saint-Louis du Senegal
org-type: MEMBER-ONLY
country: SN
address: Universite Saint-Louis du Senegal
address: Saint-Louis
phone: tel:+221-77-558-12-72
admin-c: AC4-AFRINIC
tech-c: AC4-AFRINIC
mnt-ref: AFRINIC-HM-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered

person: Alex Corenthin
address: Universite Cheikh Anta Diop de Dakar
address: UCAD
address: B.P. 5005
address: Dakar-Fann
address: Senegal
phone: tel:+221-77-631-77-76
phone: tel:+221-33-821-91-90
nic-hdl: AC4-AFRINIC
mnt-by: GENERATED-LQKJDDYODPVBD9WKBGRY2MFXIZVN4I86-MNT
source: AFRINIC # Filtered

route: 196.1.96.0/22
descr: Route Object
origin: AS8346
mnt-lower: SMM-MNT
mnt-by: AFRINIC-HM-MNT
source: AFRINIC # Filtered
most specific ip range is highlighted
Updated : 2019-08-27