Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Unicom Zhejiang Province Network

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt detected from IP address 124.90.55.101 to port 8118 [J]
2020-01-19 16:02:36
Comments on same subnet:
IP Type Details Datetime
124.90.55.88 attackbots
Unauthorized connection attempt detected from IP address 124.90.55.88 to port 80 [J]
2020-01-14 15:18:47
124.90.55.178 attack
Unauthorized connection attempt detected from IP address 124.90.55.178 to port 3129 [T]
2020-01-07 01:17:20
124.90.55.150 attack
Unauthorized connection attempt detected from IP address 124.90.55.150 to port 8118
2020-01-04 08:00:11
124.90.55.179 attack
Fail2Ban Ban Triggered
2019-12-29 14:05:25
124.90.55.2 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5433fc593db0285c | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.084743666 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 05:37:13
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.90.55.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57963
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.90.55.101.			IN	A

;; AUTHORITY SECTION:
.			523	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011900 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 16:02:32 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 101.55.90.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 101.55.90.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.89.178.12 attackspambots
Apr 12 03:45:43 124388 sshd[19383]: Invalid user veloz from 200.89.178.12 port 53752
Apr 12 03:45:43 124388 sshd[19383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.178.12
Apr 12 03:45:43 124388 sshd[19383]: Invalid user veloz from 200.89.178.12 port 53752
Apr 12 03:45:45 124388 sshd[19383]: Failed password for invalid user veloz from 200.89.178.12 port 53752 ssh2
Apr 12 03:49:45 124388 sshd[19533]: Invalid user maria from 200.89.178.12 port 56438
2020-04-12 18:27:21
45.125.65.35 attack
Apr 12 11:44:59 srv01 postfix/smtpd\[13040\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 12 11:45:20 srv01 postfix/smtpd\[13040\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 12 11:45:27 srv01 postfix/smtpd\[18985\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 12 11:54:08 srv01 postfix/smtpd\[18985\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 12 11:55:23 srv01 postfix/smtpd\[19000\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-12 18:07:01
159.89.167.59 attack
Apr 12 12:06:25 plex sshd[13179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.167.59  user=root
Apr 12 12:06:27 plex sshd[13179]: Failed password for root from 159.89.167.59 port 54198 ssh2
2020-04-12 18:08:35
173.252.87.39 attack
[Sun Apr 12 10:50:12.075241 2020] [:error] [pid 3625:tid 140295004800768] [client 173.252.87.39:49662] [client 173.252.87.39] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/prakiraan-dasarian/prakiraan-dasarian-daerah-potensi-banjir/555557973-prakiraan-dasarian-daerah-potensi-banjir-di-provinsi-jawa-timur-untuk-bulan-april-dasarian-iii-tanggal-21-30-tahun-2020-update-10-april-2020"] [unique_id "XpKP9KLL@8cf6BWsPUlIZgAAAAE"]
...
2020-04-12 18:11:43
87.251.74.7 attackbotsspam
Fail2Ban Ban Triggered
2020-04-12 18:42:04
114.67.70.94 attackspambots
Apr 12 13:32:08 itv-usvr-01 sshd[28027]: Invalid user poney from 114.67.70.94
Apr 12 13:32:08 itv-usvr-01 sshd[28027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.94
Apr 12 13:32:08 itv-usvr-01 sshd[28027]: Invalid user poney from 114.67.70.94
Apr 12 13:32:10 itv-usvr-01 sshd[28027]: Failed password for invalid user poney from 114.67.70.94 port 50500 ssh2
Apr 12 13:34:33 itv-usvr-01 sshd[28085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.70.94  user=root
Apr 12 13:34:36 itv-usvr-01 sshd[28085]: Failed password for root from 114.67.70.94 port 49180 ssh2
2020-04-12 18:13:17
101.234.76.77 attackspam
firewall-block, port(s): 1433/tcp
2020-04-12 18:14:19
109.194.198.186 attack
Chat Spam
2020-04-12 18:45:43
173.252.87.47 attackbotsspam
[Sun Apr 12 10:50:26.739960 2020] [:error] [pid 3610:tid 140294988015360] [client 173.252.87.47:54302] [client 173.252.87.47] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/favicon-32-32.png"] [unique_id "XpKQAseJ7QLCrtS-d9zLuwAAAAE"]
...
2020-04-12 18:01:20
218.92.0.171 attackspam
Apr 12 11:56:55 host sshd[7133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Apr 12 11:56:57 host sshd[7133]: Failed password for root from 218.92.0.171 port 18740 ssh2
...
2020-04-12 18:20:15
139.99.105.138 attackspambots
2020-04-12T05:45:16.573342shield sshd\[31823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138  user=root
2020-04-12T05:45:18.447087shield sshd\[31823\]: Failed password for root from 139.99.105.138 port 60952 ssh2
2020-04-12T05:48:29.603048shield sshd\[32587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138  user=root
2020-04-12T05:48:31.637560shield sshd\[32587\]: Failed password for root from 139.99.105.138 port 55398 ssh2
2020-04-12T05:51:52.689225shield sshd\[561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138  user=root
2020-04-12 18:39:50
116.196.82.80 attackspam
Apr 12 11:16:07 server sshd[13987]: Failed password for invalid user admin from 116.196.82.80 port 59362 ssh2
Apr 12 11:28:10 server sshd[28700]: Failed password for root from 116.196.82.80 port 35200 ssh2
Apr 12 11:32:22 server sshd[10481]: Failed password for root from 116.196.82.80 port 55386 ssh2
2020-04-12 18:41:32
185.97.116.138 attackspambots
Apr 12 11:17:19 cdc sshd[7319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.138  user=root
Apr 12 11:17:21 cdc sshd[7319]: Failed password for invalid user root from 185.97.116.138 port 42682 ssh2
2020-04-12 18:22:13
210.56.23.100 attackbots
Apr 12 11:45:26 ks10 sshd[3975709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.23.100 
Apr 12 11:45:28 ks10 sshd[3975709]: Failed password for invalid user admin from 210.56.23.100 port 39842 ssh2
...
2020-04-12 18:19:42
221.141.110.215 attackspam
Apr 12 10:25:48 jane sshd[14627]: Failed password for root from 221.141.110.215 port 34017 ssh2
...
2020-04-12 18:30:29

Recently Reported IPs

59.0.139.140 47.151.48.222 42.118.225.196 42.90.213.182
42.3.107.139 31.129.68.160 14.242.81.182 5.175.97.38
2.185.75.129 1.202.114.10 223.149.163.2 221.213.75.51
220.250.63.152 220.250.11.232 218.161.47.141 218.161.21.121
213.221.32.154 213.112.72.151 195.208.167.205 177.155.128.97