Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: OJSC Rostelecom

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Unauthorized connection attempt from IP address 5.137.12.14 on Port 445(SMB)
2019-08-28 07:56:12
Comments on same subnet:
IP Type Details Datetime
5.137.127.1 attack
Unauthorized connection attempt detected from IP address 5.137.127.1 to port 23 [T]
2020-06-24 03:41:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.137.12.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57871
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.137.12.14.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 28 07:56:06 CST 2019
;; MSG SIZE  rcvd: 115
Host info
14.12.137.5.in-addr.arpa domain name pointer ppp-5.137.12.14.nsk.rt.ru.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
14.12.137.5.in-addr.arpa	name = ppp-5.137.12.14.nsk.rt.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
219.84.203.57 attackbotsspam
$f2bV_matches
2019-09-02 01:07:16
54.39.150.116 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-09-02 00:16:29
92.222.75.72 attackspambots
Aug 28 18:49:35 itv-usvr-01 sshd[16126]: Invalid user derick from 92.222.75.72
Aug 28 18:49:35 itv-usvr-01 sshd[16126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.72
Aug 28 18:49:35 itv-usvr-01 sshd[16126]: Invalid user derick from 92.222.75.72
Aug 28 18:49:37 itv-usvr-01 sshd[16126]: Failed password for invalid user derick from 92.222.75.72 port 45544 ssh2
Aug 28 18:59:09 itv-usvr-01 sshd[16481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.75.72  user=root
Aug 28 18:59:11 itv-usvr-01 sshd[16481]: Failed password for root from 92.222.75.72 port 54980 ssh2
2019-09-02 01:04:57
118.25.152.227 attackbots
$f2bV_matches
2019-09-02 00:57:02
222.186.30.165 attackspambots
Sep  1 18:00:26 ubuntu-2gb-nbg1-dc3-1 sshd[21034]: Failed password for root from 222.186.30.165 port 23576 ssh2
Sep  1 18:00:30 ubuntu-2gb-nbg1-dc3-1 sshd[21034]: error: maximum authentication attempts exceeded for root from 222.186.30.165 port 23576 ssh2 [preauth]
...
2019-09-02 00:20:28
212.92.108.224 attack
RDP Bruteforce
2019-09-02 01:25:25
123.233.246.52 attack
Brute force SMTP login attempts.
2019-09-02 00:32:50
78.128.113.46 attackspam
09/01/2019-03:04:54.034621 78.128.113.46 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-02 00:31:30
180.64.71.114 attackbots
Sep  1 17:23:04 [HOSTNAME] sshd[5873]: Invalid user admin from 180.64.71.114 port 44526
Sep  1 17:28:59 [HOSTNAME] sshd[6542]: User **removed** from 180.64.71.114 not allowed because not listed in AllowUsers
Sep  1 17:35:53 [HOSTNAME] sshd[7311]: Invalid user student from 180.64.71.114 port 59870
...
2019-09-02 01:03:04
99.149.251.77 attackspam
Automatic report - Banned IP Access
2019-09-02 00:14:40
68.183.178.162 attackbotsspam
2019-09-01T17:06:55.417168  sshd[22271]: Invalid user rc from 68.183.178.162 port 49968
2019-09-01T17:06:55.430129  sshd[22271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162
2019-09-01T17:06:55.417168  sshd[22271]: Invalid user rc from 68.183.178.162 port 49968
2019-09-01T17:06:57.383920  sshd[22271]: Failed password for invalid user rc from 68.183.178.162 port 49968 ssh2
2019-09-01T17:11:34.106040  sshd[22383]: Invalid user vp from 68.183.178.162 port 38154
...
2019-09-02 00:43:53
106.52.231.160 attack
Sep  1 06:30:09 ws19vmsma01 sshd[232694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.231.160
Sep  1 06:30:11 ws19vmsma01 sshd[232694]: Failed password for invalid user mcserver from 106.52.231.160 port 42978 ssh2
...
2019-09-02 00:29:42
61.147.80.222 attackspambots
$f2bV_matches
2019-09-02 00:40:28
104.248.181.166 attackbots
Sep  1 12:05:20 TORMINT sshd\[17483\]: Invalid user mcm from 104.248.181.166
Sep  1 12:05:20 TORMINT sshd\[17483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.181.166
Sep  1 12:05:22 TORMINT sshd\[17483\]: Failed password for invalid user mcm from 104.248.181.166 port 37642 ssh2
...
2019-09-02 00:17:02
47.254.172.125 attackspambots
Sep  1 16:44:08 icinga sshd[3426]: Failed password for postgres from 47.254.172.125 port 55234 ssh2
...
2019-09-02 00:17:40

Recently Reported IPs

177.67.147.249 203.200.68.134 112.22.160.18 87.196.144.4
149.155.36.81 131.75.109.131 61.191.125.196 10.141.199.239
142.0.139.129 113.184.23.250 66.188.143.209 62.149.81.32
82.64.72.56 197.156.92.28 190.204.220.171 188.137.73.229
103.10.63.25 187.85.210.63 138.219.223.91 138.97.200.231