Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: Shenzhen Tencent Computer Systems Company Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
212.129.138.198 attackspam
Nov 21 22:16:13 ms-srv sshd[53269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198  user=nobody
Nov 21 22:16:15 ms-srv sshd[53269]: Failed password for invalid user nobody from 212.129.138.198 port 56501 ssh2
2020-03-09 04:11:53
212.129.138.198 attackspam
Nov 21 22:16:13 ms-srv sshd[53269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198  user=nobody
Nov 21 22:16:15 ms-srv sshd[53269]: Failed password for invalid user nobody from 212.129.138.198 port 56501 ssh2
2020-02-15 23:44:33
212.129.138.198 attackbots
Dec 22 16:43:07 vps691689 sshd[26358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198
Dec 22 16:43:09 vps691689 sshd[26358]: Failed password for invalid user salim from 212.129.138.198 port 43049 ssh2
Dec 22 16:49:34 vps691689 sshd[26550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198
...
2019-12-23 02:51:59
212.129.138.198 attackspam
web-1 [ssh_2] SSH Attack
2019-12-21 02:44:24
212.129.138.198 attackbots
--- report ---
Dec 17 18:58:08 sshd: Connection from 212.129.138.198 port 35432
Dec 17 18:58:11 sshd: Failed password for root from 212.129.138.198 port 35432 ssh2
Dec 17 18:58:12 sshd: Received disconnect from 212.129.138.198: 11: Bye Bye [preauth]
2019-12-18 06:26:15
212.129.138.198 attackbotsspam
Dec 17 08:49:13 ny01 sshd[26073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198
Dec 17 08:49:15 ny01 sshd[26073]: Failed password for invalid user server from 212.129.138.198 port 55663 ssh2
Dec 17 08:57:02 ny01 sshd[27254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198
2019-12-17 22:08:05
212.129.138.67 attack
Dec  4 03:05:36 sachi sshd\[27060\]: Invalid user brasov from 212.129.138.67
Dec  4 03:05:36 sachi sshd\[27060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.67
Dec  4 03:05:38 sachi sshd\[27060\]: Failed password for invalid user brasov from 212.129.138.67 port 41416 ssh2
Dec  4 03:13:47 sachi sshd\[27942\]: Invalid user corette from 212.129.138.67
Dec  4 03:13:47 sachi sshd\[27942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.67
2019-12-05 00:23:10
212.129.138.67 attack
$f2bV_matches
2019-12-04 06:00:40
212.129.138.67 attack
Nov 28 09:55:27 microserver sshd[57335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.67  user=root
Nov 28 09:55:29 microserver sshd[57335]: Failed password for root from 212.129.138.67 port 44214 ssh2
Nov 28 10:03:06 microserver sshd[58185]: Invalid user deboer from 212.129.138.67 port 54964
Nov 28 10:03:06 microserver sshd[58185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.67
Nov 28 10:03:08 microserver sshd[58185]: Failed password for invalid user deboer from 212.129.138.67 port 54964 ssh2
Nov 28 10:18:24 microserver sshd[60241]: Invalid user gronnesby from 212.129.138.67 port 48232
Nov 28 10:18:24 microserver sshd[60241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.67
Nov 28 10:18:27 microserver sshd[60241]: Failed password for invalid user gronnesby from 212.129.138.67 port 48232 ssh2
Nov 28 10:26:01 microserver sshd[61494]: Invalid user h
2019-11-28 17:57:08
212.129.138.67 attackbots
Nov 27 15:43:46 root sshd[8694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.67 
Nov 27 15:43:48 root sshd[8694]: Failed password for invalid user hoea from 212.129.138.67 port 51110 ssh2
Nov 27 15:52:35 root sshd[8837]: Failed password for backup from 212.129.138.67 port 34356 ssh2
...
2019-11-28 01:24:52
212.129.138.67 attack
Invalid user podolsky from 212.129.138.67 port 33684
2019-11-24 14:10:15
212.129.138.198 attackbotsspam
Nov 19 12:32:56 gw1 sshd[3127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.198
Nov 19 12:32:58 gw1 sshd[3127]: Failed password for invalid user knoebel from 212.129.138.198 port 54586 ssh2
...
2019-11-19 15:53:00
212.129.138.198 attack
2019-11-18T15:54:57.690607abusebot-2.cloudsearch.cf sshd\[22087\]: Invalid user maccarthy from 212.129.138.198 port 60336
2019-11-19 00:20:06
212.129.138.67 attack
SSH Brute Force, server-1 sshd[32541]: Failed password for invalid user guest from 212.129.138.67 port 48480 ssh2
2019-11-14 03:58:47
212.129.138.67 attackbotsspam
2019-11-10T05:44:13.622110  sshd[12399]: Invalid user freware from 212.129.138.67 port 39012
2019-11-10T05:44:13.635684  sshd[12399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.138.67
2019-11-10T05:44:13.622110  sshd[12399]: Invalid user freware from 212.129.138.67 port 39012
2019-11-10T05:44:15.836205  sshd[12399]: Failed password for invalid user freware from 212.129.138.67 port 39012 ssh2
2019-11-10T05:54:40.673306  sshd[12537]: Invalid user abcs from 212.129.138.67 port 52162
...
2019-11-10 13:20:01
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.129.138.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11181
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.129.138.140.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 13 00:44:09 +08 2019
;; MSG SIZE  rcvd: 119

Host info
Host 140.138.129.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 140.138.129.212.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
152.32.229.63 attackspam
Aug  5 22:27:40 myvps sshd[19319]: Failed password for root from 152.32.229.63 port 45562 ssh2
Aug  5 22:36:39 myvps sshd[25368]: Failed password for root from 152.32.229.63 port 35572 ssh2
...
2020-08-06 06:08:23
161.117.55.176 attack
Wordpress attack
2020-08-06 06:00:09
112.85.42.174 attack
Aug  6 00:21:56 melroy-server sshd[18338]: Failed password for root from 112.85.42.174 port 36654 ssh2
Aug  6 00:22:00 melroy-server sshd[18338]: Failed password for root from 112.85.42.174 port 36654 ssh2
...
2020-08-06 06:28:32
222.186.173.201 attackbots
SSH Bruteforce
2020-08-06 06:01:58
41.79.19.45 attackspam
(smtpauth) Failed SMTP AUTH login from 41.79.19.45 (ZA/South Africa/45-19-79.agc.net.za): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-06 01:09:27 plain authenticator failed for ([41.79.19.45]) [41.79.19.45]: 535 Incorrect authentication data (set_id=info)
2020-08-06 06:25:46
51.158.190.194 attack
2020-08-05T15:39:27.964344morrigan.ad5gb.com sshd[3553399]: Failed password for root from 51.158.190.194 port 36288 ssh2
2020-08-05T15:39:28.542320morrigan.ad5gb.com sshd[3553399]: Disconnected from authenticating user root 51.158.190.194 port 36288 [preauth]
2020-08-06 06:29:45
119.18.159.82 attack
Dovecot Invalid User Login Attempt.
2020-08-06 06:28:02
122.51.147.181 attackspam
Aug  5 23:53:04 rancher-0 sshd[822307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.147.181  user=root
Aug  5 23:53:06 rancher-0 sshd[822307]: Failed password for root from 122.51.147.181 port 55852 ssh2
...
2020-08-06 06:02:50
141.98.9.137 attackspambots
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-06 06:09:21
212.70.149.19 attackspam
Aug  6 00:19:49 srv01 postfix/smtpd\[17777\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 00:19:56 srv01 postfix/smtpd\[10433\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 00:19:58 srv01 postfix/smtpd\[10435\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 00:20:02 srv01 postfix/smtpd\[6122\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 00:20:18 srv01 postfix/smtpd\[10433\]: warning: unknown\[212.70.149.19\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-06 06:26:46
141.98.9.161 attackbots
2020-08-05T21:53:00.540457abusebot-4.cloudsearch.cf sshd[17273]: Invalid user admin from 141.98.9.161 port 46861
2020-08-05T21:53:00.546953abusebot-4.cloudsearch.cf sshd[17273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
2020-08-05T21:53:00.540457abusebot-4.cloudsearch.cf sshd[17273]: Invalid user admin from 141.98.9.161 port 46861
2020-08-05T21:53:02.676479abusebot-4.cloudsearch.cf sshd[17273]: Failed password for invalid user admin from 141.98.9.161 port 46861 ssh2
2020-08-05T21:53:24.965447abusebot-4.cloudsearch.cf sshd[17386]: Invalid user ubnt from 141.98.9.161 port 41981
2020-08-05T21:53:24.971794abusebot-4.cloudsearch.cf sshd[17386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161
2020-08-05T21:53:24.965447abusebot-4.cloudsearch.cf sshd[17386]: Invalid user ubnt from 141.98.9.161 port 41981
2020-08-05T21:53:27.397219abusebot-4.cloudsearch.cf sshd[17386]: Failed password
...
2020-08-06 06:03:16
49.75.199.214 attackbots
Aug  5 22:30:44 xeon sshd[26120]: Failed password for root from 49.75.199.214 port 39426 ssh2
2020-08-06 06:06:25
81.22.130.54 attackbotsspam
firewall-block, port(s): 5555/tcp
2020-08-06 05:58:45
202.28.221.106 attackspambots
Aug  5 18:42:11 vps46666688 sshd[26764]: Failed password for root from 202.28.221.106 port 33804 ssh2
...
2020-08-06 06:15:49
103.23.224.89 attackbots
Aug  5 22:35:55 vps639187 sshd\[16928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.224.89  user=root
Aug  5 22:35:57 vps639187 sshd\[16928\]: Failed password for root from 103.23.224.89 port 51324 ssh2
Aug  5 22:39:34 vps639187 sshd\[17045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.224.89  user=root
...
2020-08-06 06:25:20

Recently Reported IPs

119.55.121.74 113.195.74.83 82.64.29.249 80.178.145.232
124.13.180.162 119.27.175.249 113.160.172.198 49.84.230.103
197.47.202.236 178.33.85.143 120.211.24.5 121.17.22.174
111.10.19.16 87.98.251.172 45.56.70.42 115.114.125.146
36.77.236.200 113.176.123.45 60.168.60.217 54.242.79.118