Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kyiv

Region: Kyiv City

Country: Ukraine

Internet Service Provider: FOP Demchuk Sergiy Olexandrovuch

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 31.134.121.89 to port 445
2019-12-29 04:02:45
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.134.121.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43522
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;31.134.121.89.			IN	A

;; AUTHORITY SECTION:
.			378	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122800 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 29 04:02:42 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 89.121.134.31.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.121.134.31.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
96.75.52.245 attack
Sep 12 17:50:23 tdfoods sshd\[12124\]: Invalid user 0d00 from 96.75.52.245
Sep 12 17:50:23 tdfoods sshd\[12124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.75.52.245
Sep 12 17:50:25 tdfoods sshd\[12124\]: Failed password for invalid user 0d00 from 96.75.52.245 port 48852 ssh2
Sep 12 17:54:59 tdfoods sshd\[12462\]: Invalid user 1q2w3e4r from 96.75.52.245
Sep 12 17:54:59 tdfoods sshd\[12462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.75.52.245
2019-09-13 13:44:49
132.145.167.73 attackbots
2019-09-09 20:14:09,009 fail2ban.actions        [814]: NOTICE  [sshd] Ban 132.145.167.73
2019-09-09 23:24:36,186 fail2ban.actions        [814]: NOTICE  [sshd] Ban 132.145.167.73
2019-09-10 02:31:06,148 fail2ban.actions        [814]: NOTICE  [sshd] Ban 132.145.167.73
...
2019-09-13 13:23:16
177.184.133.41 attack
Sep 12 19:46:49 hpm sshd\[16840\]: Invalid user developer from 177.184.133.41
Sep 12 19:46:49 hpm sshd\[16840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.184.133.41
Sep 12 19:46:51 hpm sshd\[16840\]: Failed password for invalid user developer from 177.184.133.41 port 49125 ssh2
Sep 12 19:52:31 hpm sshd\[17303\]: Invalid user user from 177.184.133.41
Sep 12 19:52:31 hpm sshd\[17303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.184.133.41
2019-09-13 14:05:50
27.254.130.69 attackbotsspam
Sep 13 05:15:14 ip-172-31-1-72 sshd\[6333\]: Invalid user root123 from 27.254.130.69
Sep 13 05:15:14 ip-172-31-1-72 sshd\[6333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.69
Sep 13 05:15:16 ip-172-31-1-72 sshd\[6333\]: Failed password for invalid user root123 from 27.254.130.69 port 38413 ssh2
Sep 13 05:20:57 ip-172-31-1-72 sshd\[6397\]: Invalid user 123456 from 27.254.130.69
Sep 13 05:20:57 ip-172-31-1-72 sshd\[6397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.69
2019-09-13 13:54:48
183.157.172.55 attackbots
Fail2Ban Ban Triggered
2019-09-13 14:17:59
222.231.27.29 attackspam
Sep 13 01:43:59 plusreed sshd[12083]: Invalid user teamspeak3 from 222.231.27.29
...
2019-09-13 13:49:03
185.234.219.83 attackbotsspam
Sep 13 05:46:05 mail postfix/smtpd\[26678\]: warning: unknown\[185.234.219.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 13 06:00:16 mail postfix/smtpd\[26806\]: warning: unknown\[185.234.219.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 13 06:14:27 mail postfix/smtpd\[27122\]: warning: unknown\[185.234.219.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 13 06:57:03 mail postfix/smtpd\[27771\]: warning: unknown\[185.234.219.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-09-13 14:04:10
139.99.98.248 attack
Sep 13 08:19:02 yabzik sshd[32517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.98.248
Sep 13 08:19:04 yabzik sshd[32517]: Failed password for invalid user pass1 from 139.99.98.248 port 33860 ssh2
Sep 13 08:24:12 yabzik sshd[1938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.98.248
2019-09-13 13:39:51
79.7.207.99 attackbots
Sep 13 07:40:04 core sshd[18331]: Invalid user devpass from 79.7.207.99 port 64257
Sep 13 07:40:06 core sshd[18331]: Failed password for invalid user devpass from 79.7.207.99 port 64257 ssh2
...
2019-09-13 13:54:15
208.115.237.90 attackspam
Attempted to connect 3 times to port 5060 UDP
2019-09-13 14:20:42
49.88.112.68 attackspambots
Sep 13 00:19:50 debian sshd\[32026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
Sep 13 00:19:51 debian sshd\[32026\]: Failed password for root from 49.88.112.68 port 61820 ssh2
Sep 13 00:19:54 debian sshd\[32026\]: Failed password for root from 49.88.112.68 port 61820 ssh2
...
2019-09-13 14:09:03
122.195.200.148 attack
Sep 13 13:17:49 webhost01 sshd[9733]: Failed password for root from 122.195.200.148 port 17639 ssh2
...
2019-09-13 14:21:55
119.145.27.16 attack
Sep 13 05:42:08 hcbbdb sshd\[21062\]: Invalid user admin from 119.145.27.16
Sep 13 05:42:08 hcbbdb sshd\[21062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.145.27.16
Sep 13 05:42:10 hcbbdb sshd\[21062\]: Failed password for invalid user admin from 119.145.27.16 port 45860 ssh2
Sep 13 05:48:01 hcbbdb sshd\[21718\]: Invalid user postgres from 119.145.27.16
Sep 13 05:48:01 hcbbdb sshd\[21718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.145.27.16
2019-09-13 14:02:42
103.218.169.2 attack
Sep 13 07:08:11 meumeu sshd[22268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.169.2 
Sep 13 07:08:13 meumeu sshd[22268]: Failed password for invalid user webmaster from 103.218.169.2 port 47142 ssh2
Sep 13 07:13:20 meumeu sshd[23006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.169.2 
...
2019-09-13 13:52:43
139.59.141.137 attackbots
2019-09-02 20:57:48,287 fail2ban.actions        [804]: NOTICE  [sshd] Ban 139.59.141.137
2019-09-03 00:03:17,260 fail2ban.actions        [804]: NOTICE  [sshd] Ban 139.59.141.137
2019-09-03 03:08:21,671 fail2ban.actions        [804]: NOTICE  [sshd] Ban 139.59.141.137
...
2019-09-13 13:22:27

Recently Reported IPs

176.28.23.220 61.196.86.100 5.39.217.81 34.252.140.225
62.113.174.192 2.187.27.183 93.49.210.255 97.253.0.132
197.50.135.150 18.204.103.164 198.96.76.86 190.181.2.248
45.76.86.29 220.178.156.27 190.127.252.19 66.120.146.196
211.209.23.41 211.96.182.65 187.222.106.63 59.57.245.189