Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Czech Republic

Internet Service Provider: CoProSys a.s.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-31 20:08:31,866 INFO [amun_request_handler] PortScan Detected on Port: 445 (5.59.13.163)
2019-09-01 08:59:16
Comments on same subnet:
IP Type Details Datetime
5.59.137.138 attackbotsspam
20/8/21@08:45:53: FAIL: Alarm-Network address from=5.59.137.138
...
2020-08-22 02:44:45
5.59.138.146 attackspam
Hits on port : 445(x2)
2020-05-12 17:32:38
5.59.136.226 attack
proto=tcp  .  spt=40679  .  dpt=25  .     Listed on    MailSpike (spam wave plus L3-L5) also rbldns-ru and manitu-net     (189)
2020-04-16 23:00:12
5.59.133.150 attackspam
Unauthorized connection attempt from IP address 5.59.133.150 on Port 445(SMB)
2020-04-10 01:19:13
5.59.136.226 attackbots
email spam
2019-12-19 20:29:26
5.59.133.133 attackbots
Unauthorised access (Nov 23) SRC=5.59.133.133 LEN=52 TTL=119 ID=31901 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-23 17:07:03
5.59.135.94 attack
Unauthorized connection attempt from IP address 5.59.135.94 on Port 445(SMB)
2019-10-31 03:30:37
5.59.133.122 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-04 22:46:08,555 INFO [amun_request_handler] PortScan Detected on Port: 445 (5.59.133.122)
2019-07-05 08:25:32
5.59.133.122 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 17:20:06,439 INFO [amun_request_handler] PortScan Detected on Port: 445 (5.59.133.122)
2019-06-30 10:34:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.59.13.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31739
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.59.13.163.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083102 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 08:59:06 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 163.13.59.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 163.13.59.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.163.59.242 attackbotsspam
Microsoft-Windows-Security-Auditing
2019-12-01 03:50:45
207.180.239.99 attack
[ 🇳🇱 ] REQUEST: /provisioning/yealink/y000000000000.cfg
2019-12-01 03:46:36
40.77.167.90 attackbotsspam
Automatic report - Banned IP Access
2019-12-01 03:54:34
81.22.45.150 attackspambots
11/30/2019-14:48:47.336904 81.22.45.150 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-01 03:55:20
179.57.233.167 attackbots
Unauthorized connection attempt from IP address 179.57.233.167 on Port 445(SMB)
2019-12-01 03:34:53
106.75.86.217 attackspambots
Automatic report - Banned IP Access
2019-12-01 03:36:42
131.255.11.208 attackspam
Unauthorized connection attempt from IP address 131.255.11.208 on Port 445(SMB)
2019-12-01 04:02:35
31.207.33.10 attack
Detected by ModSecurity. Request URI: /bg/db.php
2019-12-01 03:44:27
109.102.125.254 attack
Unauthorized connection attempt from IP address 109.102.125.254 on Port 445(SMB)
2019-12-01 03:29:56
14.63.169.33 attack
$f2bV_matches
2019-12-01 03:30:11
42.117.100.109 attackspam
Unauthorized connection attempt from IP address 42.117.100.109 on Port 445(SMB)
2019-12-01 03:46:09
113.165.166.65 attack
Unauthorized connection attempt from IP address 113.165.166.65 on Port 445(SMB)
2019-12-01 03:47:27
5.139.208.17 attackbots
Nov 30 18:07:51 sso sshd[13923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.139.208.17
Nov 30 18:07:53 sso sshd[13923]: Failed password for invalid user dumpy from 5.139.208.17 port 45584 ssh2
...
2019-12-01 03:33:31
187.188.231.90 attackbotsspam
Unauthorized connection attempt from IP address 187.188.231.90 on Port 445(SMB)
2019-12-01 03:30:25
183.171.67.31 attack
Unauthorized connection attempt from IP address 183.171.67.31 on Port 445(SMB)
2019-12-01 03:55:52

Recently Reported IPs

118.70.124.76 122.156.6.143 213.186.143.163 122.167.136.18
103.109.53.6 130.109.247.162 58.241.151.223 210.211.116.204
38.2.224.209 55.239.58.184 35.240.226.127 113.110.192.20
177.40.43.86 185.153.196.3 62.109.8.153 90.152.152.132
71.72.195.242 37.146.63.144 152.32.72.37 34.249.231.42