Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: MO's Operations GmbH

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Jul 29 23:04:37 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=185.132.53.42 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=60 ID=54870 PROTO=TCP SPT=44528 DPT=23 WINDOW=45335 RES=0x00 SYN URGP=0 Jul 29 23:08:35 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=185.132.53.42 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=60 ID=54870 PROTO=TCP SPT=44528 DPT=23 WINDOW=45335 RES=0x00 SYN URGP=0 Jul 29 23:08:47 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=185.132.53.42 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=60 ID=54870 PROTO=TCP SPT=44528 DPT=23 WINDOW=45335 RES=0x00 SYN URGP=0 Jul 29 23:09:28 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=185.132.53.42 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=60 ID=54870 PROTO=TCP SPT=44528 DPT=23 WINDOW=45335 RES=0x00 SYN URGP=0 Jul 29 23:19:06 *hidden* ker
...
2020-07-30 06:38:44
attack
20/7/29@08:13:54: FAIL: IoT-Telnet address from=185.132.53.42
...
2020-07-29 20:48:27
Comments on same subnet:
IP Type Details Datetime
185.132.53.115 attackspambots
Invalid user admin from 185.132.53.115 port 35110
2020-10-14 01:18:44
185.132.53.115 attack
Oct 13 10:06:29 ns1 sshd[78677]: Did not receive identification string from 185.132.53.115 port 44168
Oct 13 10:06:33 ns1 sshd[78678]: Unable to negotiate with 185.132.53.115 port 40660: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Oct 13 10:06:49 ns1 sshd[78680]: Unable to negotiate with 185.132.53.115 port 41618: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Oct 13 10:07:05 ns1 sshd[78682]: Unable to negotiate with 185.132.53.115 port 42644: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Oct 13 10:07:20 ns1 sshd[78684]: Unable to negotiate with 185.132.53.115 port 43726: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-e
...
2020-10-13 16:28:43
185.132.53.115 attackbotsspam
Oct 12 20:59:42 targaryen sshd[6336]: Invalid user admin from 185.132.53.115
Oct 12 20:59:56 targaryen sshd[6338]: Invalid user admin from 185.132.53.115
Oct 12 21:00:12 targaryen sshd[6343]: Invalid user admin from 185.132.53.115
Oct 12 21:00:27 targaryen sshd[6345]: Invalid user admin from 185.132.53.115
...
2020-10-13 09:00:50
185.132.53.85 attack
SSH Brute Force (V)
2020-10-11 01:03:15
185.132.53.85 attackspambots
Unauthorized connection attempt detected from IP address 185.132.53.85 to port 22
2020-10-10 16:54:57
185.132.53.14 attackbotsspam
Oct  9 01:11:02 elp-server sshd[85411]: Unable to negotiate with 185.132.53.14 port 48206: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Oct  9 01:11:19 elp-server sshd[85417]: Unable to negotiate with 185.132.53.14 port 48212: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Oct  9 01:11:36 elp-server sshd[85423]: Unable to negotiate with 185.132.53.14 port 48258: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-10-09 07:35:57
185.132.53.14 attackspam
(sshd) Failed SSH login from 185.132.53.14 (DE/Germany/vps32.virtual4host.pt): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  8 11:51:30 server sshd[22256]: Did not receive identification string from 185.132.53.14 port 55218
Oct  8 11:51:58 server sshd[22312]: Failed password for root from 185.132.53.14 port 33202 ssh2
Oct  8 11:52:15 server sshd[22379]: Invalid user oracle from 185.132.53.14 port 33402
Oct  8 11:52:16 server sshd[22379]: Failed password for invalid user oracle from 185.132.53.14 port 33402 ssh2
Oct  8 11:52:35 server sshd[22457]: Failed password for root from 185.132.53.14 port 33592 ssh2
2020-10-09 00:07:57
185.132.53.14 attackbotsspam
Oct  8 09:38:37 sd-69548 sshd[84133]: Unable to negotiate with 185.132.53.14 port 35272: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Oct  8 09:38:55 sd-69548 sshd[84153]: Unable to negotiate with 185.132.53.14 port 58052: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-10-08 16:03:26
185.132.53.115 attackbotsspam
Oct  6 22:25:15 nas sshd[30358]: Failed password for root from 185.132.53.115 port 42610 ssh2
Oct  6 22:25:31 nas sshd[30780]: Failed password for root from 185.132.53.115 port 40618 ssh2
...
2020-10-07 04:51:46
185.132.53.124 attack
Oct  6 11:27:26 alfc-lms-prod01 sshd\[25821\]: Invalid user user from 185.132.53.124
Oct  6 11:27:33 alfc-lms-prod01 sshd\[25825\]: Invalid user git from 185.132.53.124
Oct  6 11:27:41 alfc-lms-prod01 sshd\[25827\]: Invalid user postgres from 185.132.53.124
...
2020-10-07 04:24:11
185.132.53.115 attack
Icarus honeypot on github
2020-10-06 20:57:26
185.132.53.124 attackspambots
Oct  6 11:27:26 alfc-lms-prod01 sshd\[25821\]: Invalid user user from 185.132.53.124
Oct  6 11:27:33 alfc-lms-prod01 sshd\[25825\]: Invalid user git from 185.132.53.124
Oct  6 11:27:41 alfc-lms-prod01 sshd\[25827\]: Invalid user postgres from 185.132.53.124
...
2020-10-06 20:28:16
185.132.53.115 attack
Oct  6 06:18:41 ns382633 sshd\[16857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.132.53.115  user=root
Oct  6 06:18:43 ns382633 sshd\[16857\]: Failed password for root from 185.132.53.115 port 39806 ssh2
Oct  6 06:18:55 ns382633 sshd\[16861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.132.53.115  user=root
Oct  6 06:18:58 ns382633 sshd\[16861\]: Failed password for root from 185.132.53.115 port 33824 ssh2
Oct  6 06:19:11 ns382633 sshd\[17121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.132.53.115  user=root
2020-10-06 12:38:44
185.132.53.124 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-06 12:07:49
185.132.53.124 attackbots
fail2ban detected bruce force on ssh iptables
2020-10-06 05:46:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.132.53.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;185.132.53.42.			IN	A

;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072900 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 29 20:48:20 CST 2020
;; MSG SIZE  rcvd: 117
Host info
42.53.132.185.in-addr.arpa domain name pointer soft11.datechating24.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.53.132.185.in-addr.arpa	name = soft11.datechating24.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.237.54.236 attackspambots
Lines containing failures of 212.237.54.236
Oct  7 10:40:10 shared06 sshd[8165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.54.236  user=r.r
Oct  7 10:40:12 shared06 sshd[8165]: Failed password for r.r from 212.237.54.236 port 54072 ssh2
Oct  7 10:40:12 shared06 sshd[8165]: Received disconnect from 212.237.54.236 port 54072:11: Bye Bye [preauth]
Oct  7 10:40:12 shared06 sshd[8165]: Disconnected from authenticating user r.r 212.237.54.236 port 54072 [preauth]
Oct  7 10:52:27 shared06 sshd[11785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.54.236  user=r.r
Oct  7 10:52:28 shared06 sshd[11785]: Failed password for r.r from 212.237.54.236 port 49234 ssh2
Oct  7 10:52:29 shared06 sshd[11785]: Received disconnect from 212.237.54.236 port 49234:11: Bye Bye [preauth]
Oct  7 10:52:29 shared06 sshd[11785]: Disconnected from authenticating user r.r 212.237.54.236 port 49234 [pr........
------------------------------
2019-10-08 02:39:00
188.131.216.109 attack
Automatic report - SSH Brute-Force Attack
2019-10-08 02:26:37
184.154.74.69 attackbots
3389BruteforceFW21
2019-10-08 02:23:59
159.203.201.97 attackspam
Port scan: Attack repeated for 24 hours
2019-10-08 02:24:26
193.31.210.138 attackspam
Oct  7 16:02:00 h2177944 kernel: \[3333023.894597\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=193.31.210.138 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=62 ID=30042 DF PROTO=TCP SPT=64318 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  7 16:02:55 h2177944 kernel: \[3333078.577712\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=193.31.210.138 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=69 ID=1613 DF PROTO=TCP SPT=49836 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  7 16:02:58 h2177944 kernel: \[3333081.683501\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=193.31.210.138 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=52 ID=51802 DF PROTO=TCP SPT=59971 DPT=465 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  7 16:08:40 h2177944 kernel: \[3333423.020061\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=193.31.210.138 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=80 ID=61855 DF PROTO=TCP SPT=59575 DPT=53 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  7 16:16:16 h2177944 kernel: \[3333878.906229\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=193.31.210.138 DST=85
2019-10-08 02:37:35
45.136.109.239 attack
firewall-block, port(s): 321/tcp, 1028/tcp, 1029/tcp, 1045/tcp, 1051/tcp, 1112/tcp, 1414/tcp, 1589/tcp, 3311/tcp, 3504/tcp, 3894/tcp, 4043/tcp, 4485/tcp, 4700/tcp, 5523/tcp, 5565/tcp, 5595/tcp, 7189/tcp, 7713/tcp, 7745/tcp, 7781/tcp, 10033/tcp, 15451/tcp, 60806/tcp
2019-10-08 02:16:06
81.30.212.14 attackbotsspam
Oct  7 19:54:01 vps647732 sshd[9527]: Failed password for root from 81.30.212.14 port 56904 ssh2
...
2019-10-08 02:13:05
90.150.180.66 attack
Dovecot Brute-Force
2019-10-08 02:28:06
60.170.204.100 attackbots
Unauthorised access (Oct  7) SRC=60.170.204.100 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=36487 TCP DPT=8080 WINDOW=22978 SYN 
Unauthorised access (Oct  7) SRC=60.170.204.100 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=33777 TCP DPT=8080 WINDOW=22978 SYN 
Unauthorised access (Oct  6) SRC=60.170.204.100 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=64655 TCP DPT=8080 WINDOW=23524 SYN
2019-10-08 02:41:22
195.96.253.142 attack
vps1:pam-generic
2019-10-08 02:10:41
41.73.252.236 attackspam
$f2bV_matches
2019-10-08 02:29:32
67.55.92.89 attackspambots
Oct  7 12:42:02 work-partkepr sshd\[29848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89  user=root
Oct  7 12:42:04 work-partkepr sshd\[29848\]: Failed password for root from 67.55.92.89 port 59610 ssh2
...
2019-10-08 02:43:12
106.12.176.3 attackspam
Oct  7 19:29:42 web1 sshd\[14262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.3  user=root
Oct  7 19:29:44 web1 sshd\[14262\]: Failed password for root from 106.12.176.3 port 54554 ssh2
Oct  7 19:35:28 web1 sshd\[14638\]: Invalid user 123 from 106.12.176.3
Oct  7 19:35:28 web1 sshd\[14638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.3
Oct  7 19:35:30 web1 sshd\[14638\]: Failed password for invalid user 123 from 106.12.176.3 port 41966 ssh2
2019-10-08 02:21:00
142.93.33.62 attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-10-08 02:07:45
36.77.187.107 attackspambots
Unauthorised access (Oct  7) SRC=36.77.187.107 LEN=52 TTL=247 ID=31279 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-08 02:20:12

Recently Reported IPs

119.233.255.110 153.98.177.50 195.193.125.45 64.199.142.93
243.17.106.177 244.20.217.55 211.253.133.48 239.164.192.67
135.113.198.35 241.96.66.60 97.23.171.163 195.162.156.98
1.164.162.221 85.40.49.104 96.18.102.41 191.7.125.128
170.0.155.219 212.64.5.28 123.20.35.191 46.101.105.183