Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
116.54.42.231 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 5412f4529cb2eb71 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.077692140 Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:16:29
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.54.42.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50296
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.54.42.5.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:47:24 CST 2022
;; MSG SIZE  rcvd: 104
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
server can't find 116.54.42.5.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
182.180.128.132 attackspam
Dec 18 05:52:23 vps691689 sshd[31642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.128.132
Dec 18 05:52:25 vps691689 sshd[31642]: Failed password for invalid user pcap from 182.180.128.132 port 55806 ssh2
...
2019-12-18 13:06:28
49.37.139.223 attackspambots
1576645127 - 12/18/2019 05:58:47 Host: 49.37.139.223/49.37.139.223 Port: 445 TCP Blocked
2019-12-18 13:16:14
103.56.205.232 attackbots
Dec 18 05:48:47 meumeu sshd[20763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.205.232 
Dec 18 05:48:50 meumeu sshd[20763]: Failed password for invalid user sinh from 103.56.205.232 port 55012 ssh2
Dec 18 05:58:42 meumeu sshd[22382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.205.232 
...
2019-12-18 13:20:42
27.59.105.211 attack
Unauthorised access (Dec 18) SRC=27.59.105.211 LEN=48 TOS=0x08 TTL=113 ID=31908 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-18 13:17:40
121.66.224.90 attackspam
Dec 18 07:45:07 server sshd\[22852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90  user=root
Dec 18 07:45:09 server sshd\[22852\]: Failed password for root from 121.66.224.90 port 55872 ssh2
Dec 18 07:58:52 server sshd\[26602\]: Invalid user archuleta from 121.66.224.90
Dec 18 07:58:52 server sshd\[26602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90 
Dec 18 07:58:54 server sshd\[26602\]: Failed password for invalid user archuleta from 121.66.224.90 port 54060 ssh2
...
2019-12-18 13:07:34
39.91.104.104 attackbots
SSH Brute-Force attacks
2019-12-18 13:07:47
54.37.233.192 attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-12-18 13:44:20
40.92.75.14 attackbotsspam
Dec 18 07:58:46 debian-2gb-vpn-nbg1-1 kernel: [1023491.163790] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.75.14 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=46427 DF PROTO=TCP SPT=13742 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-18 13:17:13
201.32.178.190 attackbots
Dec 18 07:36:48 sauna sshd[15832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.32.178.190
Dec 18 07:36:51 sauna sshd[15832]: Failed password for invalid user test from 201.32.178.190 port 33325 ssh2
...
2019-12-18 13:39:11
112.162.191.160 attack
Dec 17 19:01:35 web1 sshd\[17808\]: Invalid user lcimonet from 112.162.191.160
Dec 17 19:01:35 web1 sshd\[17808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.162.191.160
Dec 17 19:01:38 web1 sshd\[17808\]: Failed password for invalid user lcimonet from 112.162.191.160 port 35272 ssh2
Dec 17 19:08:50 web1 sshd\[18570\]: Invalid user catteryde from 112.162.191.160
Dec 17 19:08:50 web1 sshd\[18570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.162.191.160
2019-12-18 13:41:03
192.241.213.168 attackspambots
Dec 18 05:53:03 meumeu sshd[21362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.213.168 
Dec 18 05:53:05 meumeu sshd[21362]: Failed password for invalid user clerk from 192.241.213.168 port 48534 ssh2
Dec 18 05:58:50 meumeu sshd[22409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.213.168 
...
2019-12-18 13:13:32
168.90.89.35 attackbotsspam
Dec 17 19:12:31 auw2 sshd\[6940\]: Invalid user ax400 from 168.90.89.35
Dec 17 19:12:31 auw2 sshd\[6940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35.megalinkpi.net.br
Dec 17 19:12:33 auw2 sshd\[6940\]: Failed password for invalid user ax400 from 168.90.89.35 port 51772 ssh2
Dec 17 19:19:35 auw2 sshd\[7585\]: Invalid user ttttt from 168.90.89.35
Dec 17 19:19:35 auw2 sshd\[7585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35.megalinkpi.net.br
2019-12-18 13:25:48
5.39.61.223 attackspam
Dec 17 23:58:48 mail sshd\[27844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.61.223  user=root
...
2019-12-18 13:12:26
118.70.233.163 attack
Dec 18 06:14:49 vpn01 sshd[4498]: Failed password for root from 118.70.233.163 port 41554 ssh2
Dec 18 06:21:49 vpn01 sshd[4799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.233.163
...
2019-12-18 13:22:32
188.253.2.132 attackspambots
" "
2019-12-18 13:05:29

Recently Reported IPs

116.58.241.225 116.6.84.116 116.58.202.49 116.62.247.63
116.62.157.74 116.54.8.160 116.55.41.154 116.6.68.114
116.58.254.75 116.68.111.156 116.68.96.137 116.68.97.229
116.68.163.7 116.68.97.39 116.68.97.127 116.68.98.244
116.7.11.178 116.7.96.79 116.7.18.220 116.68.98.142