Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kowloon

Region: Kowloon City

Country: Hong Kong

Internet Service Provider: PCCW IMS Ltd

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
The IP has triggered Cloudflare WAF. CF-Ray: 54149f4ddb77dce6 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: HK | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_2) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.0.4 Safari/605.1.15 | CF_DC: SIN. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 02:50:18
Comments on same subnet:
IP Type Details Datetime
42.200.113.220 attackbotsspam
Caught in portsentry honeypot
2019-08-17 19:36:19
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.200.113.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.200.113.140.			IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120700 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 02:50:15 CST 2019
;; MSG SIZE  rcvd: 118
Host info
140.113.200.42.in-addr.arpa domain name pointer 42-200-113-140.static.imsbiz.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.113.200.42.in-addr.arpa	name = 42-200-113-140.static.imsbiz.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.15.253.163 attackbots
445/tcp
[2019-06-23]1pkt
2019-06-24 04:26:01
195.206.105.217 attackbots
Jun 23 22:03:51 cvbmail sshd\[18750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.206.105.217  user=root
Jun 23 22:03:54 cvbmail sshd\[18750\]: Failed password for root from 195.206.105.217 port 40108 ssh2
Jun 23 22:10:46 cvbmail sshd\[18921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.206.105.217  user=root
2019-06-24 04:57:34
62.73.121.111 attackspam
Jun 21 08:18:34 server6 sshd[24307]: Bad protocol version identification '' from 62.73.121.111 port 49602
Jun 21 08:19:04 server6 sshd[5243]: reveeclipse mapping checking getaddrinfo for 62-73-121-111.btc-net.bg [62.73.121.111] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 21 08:19:06 server6 sshd[5243]: Failed password for invalid user cisco from 62.73.121.111 port 48230 ssh2
Jun 21 08:19:06 server6 sshd[5243]: Connection closed by 62.73.121.111 [preauth]
Jun 21 08:21:07 server6 sshd[13740]: reveeclipse mapping checking getaddrinfo for 62-73-121-111.btc-net.bg [62.73.121.111] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 21 08:21:07 server6 sshd[13740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.73.121.111  user=r.r
Jun 21 08:21:10 server6 sshd[13740]: Failed password for r.r from 62.73.121.111 port 44442 ssh2
Jun 21 08:21:10 server6 sshd[13740]: Connection closed by 62.73.121.111 [preauth]
Jun 21 08:21:58 server6 sshd[27522]: reveec........
-------------------------------
2019-06-24 04:20:34
42.117.205.199 attack
23/tcp 23/tcp
[2019-06-23]2pkt
2019-06-24 04:21:46
121.232.16.51 attack
2019-06-23T21:50:38.371291 X postfix/smtpd[41518]: warning: unknown[121.232.16.51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T22:10:42.346005 X postfix/smtpd[44619]: warning: unknown[121.232.16.51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23T22:11:15.240637 X postfix/smtpd[44622]: warning: unknown[121.232.16.51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-24 04:38:30
190.254.51.46 attackspambots
SSH Brute Force, server-1 sshd[30208]: Failed password for invalid user upload from 190.254.51.46 port 54396 ssh2
2019-06-24 04:51:36
123.24.222.116 attackspambots
Spam Timestamp : 23-Jun-19 20:12 _ BlockList Provider  combined abuse _ (1035)
2019-06-24 04:31:36
188.131.237.17 attackspam
Jun 23 22:33:07 giegler sshd[14428]: Invalid user tq from 188.131.237.17 port 56088
Jun 23 22:33:09 giegler sshd[14428]: Failed password for invalid user tq from 188.131.237.17 port 56088 ssh2
Jun 23 22:33:07 giegler sshd[14428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.237.17
Jun 23 22:33:07 giegler sshd[14428]: Invalid user tq from 188.131.237.17 port 56088
Jun 23 22:33:09 giegler sshd[14428]: Failed password for invalid user tq from 188.131.237.17 port 56088 ssh2
2019-06-24 04:46:09
188.162.185.254 attack
445/tcp
[2019-06-23]1pkt
2019-06-24 04:37:39
187.120.136.226 attack
SMTP-sasl brute force
...
2019-06-24 04:22:24
178.128.10.204 attack
Jun 21 03:59:11 zulu1842 sshd[22733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.10.204  user=r.r
Jun 21 03:59:13 zulu1842 sshd[22733]: Failed password for r.r from 178.128.10.204 port 51948 ssh2
Jun 21 03:59:14 zulu1842 sshd[22733]: Received disconnect from 178.128.10.204: 11: Bye Bye [preauth]
Jun 21 03:59:20 zulu1842 sshd[22742]: Invalid user admin from 178.128.10.204
Jun 21 03:59:20 zulu1842 sshd[22742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.10.204 
Jun 21 03:59:22 zulu1842 sshd[22742]: Failed password for invalid user admin from 178.128.10.204 port 58958 ssh2
Jun 21 03:59:22 zulu1842 sshd[22742]: Received disconnect from 178.128.10.204: 11: Bye Bye [preauth]
Jun 21 03:59:28 zulu1842 sshd[22747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.10.204  user=r.r
Jun 21 03:59:30 zulu1842 sshd[22747]: Failed passw........
-------------------------------
2019-06-24 04:17:00
79.180.211.22 attack
Spam Timestamp : 23-Jun-19 20:06 _ BlockList Provider  combined abuse _ (1033)
2019-06-24 04:35:19
41.47.234.152 attackbotsspam
23/tcp
[2019-06-23]1pkt
2019-06-24 04:25:28
89.132.74.172 attack
SSH Bruteforce Attack
2019-06-24 04:13:42
78.72.167.122 attackspambots
8080/tcp
[2019-06-23]1pkt
2019-06-24 04:27:04

Recently Reported IPs

80.8.152.89 82.124.210.252 27.224.136.194 45.76.33.102
112.6.181.32 27.91.124.208 13.124.153.64 120.6.117.204
2.57.254.26 124.148.229.229 1.202.112.192 188.218.5.188
101.116.133.217 1.202.112.141 205.154.96.126 84.31.136.169
182.249.99.139 2.70.42.52 140.147.194.112 222.94.195.60