Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Greece

Internet Service Provider: Vodafone-Panafon Hellenic Telecommunications Company SA

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
DATE:2019-07-28 13:29:20, IP:5.55.0.12, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-28 21:12:09
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.55.0.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55026
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.55.0.12.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 28 21:12:02 CST 2019
;; MSG SIZE  rcvd: 113
Host info
12.0.55.5.in-addr.arpa domain name pointer ppp005055000012.access.hol.gr.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
12.0.55.5.in-addr.arpa	name = ppp005055000012.access.hol.gr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.36.191.108 attack
5555/tcp
[2020-10-04]1pkt
2020-10-06 06:33:03
139.59.102.170 attack
Oct  5 19:08:57 mellenthin sshd[19326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.102.170  user=root
Oct  5 19:08:59 mellenthin sshd[19326]: Failed password for invalid user root from 139.59.102.170 port 37134 ssh2
2020-10-06 06:29:37
164.90.182.227 attack
Oct  5 18:03:19 db sshd[12261]: User root from 164.90.182.227 not allowed because none of user's groups are listed in AllowGroups
...
2020-10-06 06:58:10
212.70.149.52 attackbots
Oct  6 00:40:20 srv01 postfix/smtpd\[6813\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  6 00:40:27 srv01 postfix/smtpd\[17215\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  6 00:40:28 srv01 postfix/smtpd\[17220\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  6 00:40:29 srv01 postfix/smtpd\[17015\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  6 00:40:47 srv01 postfix/smtpd\[17181\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-06 06:44:20
123.163.116.142 attackspam
Oct  5 05:12:58 inter-technics sshd[4305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.163.116.142  user=root
Oct  5 05:13:00 inter-technics sshd[4305]: Failed password for root from 123.163.116.142 port 57844 ssh2
Oct  5 05:16:29 inter-technics sshd[4531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.163.116.142  user=root
Oct  5 05:16:31 inter-technics sshd[4531]: Failed password for root from 123.163.116.142 port 39376 ssh2
Oct  5 05:19:53 inter-technics sshd[4671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.163.116.142  user=root
Oct  5 05:19:55 inter-technics sshd[4671]: Failed password for root from 123.163.116.142 port 49140 ssh2
...
2020-10-06 06:54:00
41.65.186.232 attackbots
445/tcp 445/tcp
[2020-10-04]2pkt
2020-10-06 06:46:34
194.5.176.47 attack
194.5.176.47 (IR/Iran/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  5 05:45:45 jbs1 sshd[8714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.132.52.29  user=root
Oct  5 05:44:29 jbs1 sshd[8246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.198.138  user=root
Oct  5 05:44:31 jbs1 sshd[8246]: Failed password for root from 128.199.198.138 port 57928 ssh2
Oct  5 05:44:23 jbs1 sshd[7764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.176.47  user=root
Oct  5 05:44:25 jbs1 sshd[7764]: Failed password for root from 194.5.176.47 port 58150 ssh2
Oct  5 05:42:18 jbs1 sshd[7508]: Failed password for root from 34.126.118.178 port 1075 ssh2

IP Addresses Blocked:

61.132.52.29 (CN/China/-)
128.199.198.138 (SG/Singapore/-)
2020-10-06 06:36:22
124.193.142.2 attackbotsspam
Oct  5 18:05:24 mail01 sshd[13561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.193.142.2  user=r.r
Oct  5 18:05:26 mail01 sshd[13561]: Failed password for r.r from 124.193.142.2 port 33502 ssh2
Oct  5 18:05:26 mail01 sshd[13561]: Received disconnect from 124.193.142.2 port 33502:11:  [preauth]
Oct  5 18:05:26 mail01 sshd[13561]: Disconnected from 124.193.142.2 port 33502 [preauth]
Oct  5 18:20:20 mail01 sshd[13762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.193.142.2  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=124.193.142.2
2020-10-06 07:03:02
138.68.58.131 attackbotsspam
SSH Invalid Login
2020-10-06 07:04:05
194.158.200.150 attackspambots
Automatic report - Port Scan Attack
2020-10-06 06:54:47
138.99.188.144 attack
Blocked by Sophos UTM Network Protection . /    / proto=17  .  srcport=25955  .  dstport=43215  .     (3546)
2020-10-06 06:38:54
89.221.223.46 attackbotsspam
SSH login attempts.
2020-10-06 06:54:21
122.194.229.37 attack
$f2bV_matches
2020-10-06 06:31:13
17.58.98.182 attackspam
Bad web bot already banned
2020-10-06 06:57:52
82.64.118.56 attack
82.64.118.56 (FR/France/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  5 03:54:57 server2 sshd[17504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.14.125  user=root
Oct  5 03:54:59 server2 sshd[17504]: Failed password for root from 120.131.14.125 port 11172 ssh2
Oct  5 03:55:00 server2 sshd[17526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.26.250.41  user=root
Oct  5 03:55:02 server2 sshd[17526]: Failed password for root from 89.26.250.41 port 49160 ssh2
Oct  5 03:55:04 server2 sshd[17791]: Failed password for root from 82.64.118.56 port 38368 ssh2
Oct  5 03:55:06 server2 sshd[17529]: Failed password for root from 51.75.170.128 port 38086 ssh2

IP Addresses Blocked:

120.131.14.125 (CN/China/-)
89.26.250.41 (PT/Portugal/-)
2020-10-06 06:33:32

Recently Reported IPs

243.113.190.230 233.231.16.243 27.171.171.174 133.31.55.99
174.232.89.125 220.101.187.28 86.220.216.42 242.250.158.168
75.156.122.248 62.105.90.174 168.197.117.255 116.88.90.224
118.15.32.13 129.90.205.89 221.144.61.118 198.2.231.13
32.100.136.54 150.165.71.101 15.121.86.15 106.36.158.83