Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: Holcim Services (Asia) Co. Ltd.

Hostname: unknown

Organization: Siam City Cement Public Company Limited

Usage Type: University/College/School

Comments:
Type Details Datetime
attackbotsspam
Unauthorized connection attempt detected from IP address 58.137.216.3 to port 445 [T]
2020-08-30 17:15:30
attackbots
Unauthorised access (Jun 20) SRC=58.137.216.3 LEN=52 PREC=0x40 TTL=104 ID=21754 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-20 13:17:45
attack
Unauthorized connection attempt from IP address 58.137.216.3 on Port 445(SMB)
2020-03-09 18:28:00
attack
Unauthorized connection attempt from IP address 58.137.216.3 on Port 445(SMB)
2019-09-20 07:54:05
attackspambots
Unauthorized connection attempt from IP address 58.137.216.3 on Port 445(SMB)
2019-07-11 10:45:24
attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 12:31:53,425 INFO [amun_request_handler] PortScan Detected on Port: 445 (58.137.216.3)
2019-07-04 05:30:25
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.137.216.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56262
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;58.137.216.3.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070302 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 04 05:30:20 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 3.216.137.58.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 3.216.137.58.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.99.116.11 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: ip11.ip-192-99-116.net.
2019-07-05 05:52:34
139.59.35.148 attackbotsspam
Invalid user fake from 139.59.35.148 port 50740
2019-07-05 05:59:02
121.162.131.223 attackbots
ssh failed login
2019-07-05 06:17:21
134.175.39.108 attackbots
Feb 10 21:08:16 dillonfme sshd\[25622\]: Invalid user teacher from 134.175.39.108 port 55312
Feb 10 21:08:16 dillonfme sshd\[25622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108
Feb 10 21:08:17 dillonfme sshd\[25622\]: Failed password for invalid user teacher from 134.175.39.108 port 55312 ssh2
Feb 10 21:14:29 dillonfme sshd\[25901\]: Invalid user tester from 134.175.39.108 port 46650
Feb 10 21:14:29 dillonfme sshd\[25901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108
...
2019-07-05 05:57:22
36.231.149.249 attack
Unauthorized connection attempt from IP address 36.231.149.249 on Port 445(SMB)
2019-07-05 05:41:53
54.38.82.14 attack
Jul  4 17:47:09 vps200512 sshd\[16065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Jul  4 17:47:11 vps200512 sshd\[16065\]: Failed password for root from 54.38.82.14 port 57884 ssh2
Jul  4 17:47:12 vps200512 sshd\[16067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Jul  4 17:47:14 vps200512 sshd\[16067\]: Failed password for root from 54.38.82.14 port 43154 ssh2
Jul  4 17:47:15 vps200512 sshd\[16069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
2019-07-05 06:15:24
167.114.234.52 attackbotsspam
Automatic report - Web App Attack
2019-07-05 06:01:55
157.230.237.76 attackspam
Jul  4 22:01:52 MK-Soft-VM7 sshd\[29459\]: Invalid user petru from 157.230.237.76 port 41660
Jul  4 22:01:52 MK-Soft-VM7 sshd\[29459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.237.76
Jul  4 22:01:54 MK-Soft-VM7 sshd\[29459\]: Failed password for invalid user petru from 157.230.237.76 port 41660 ssh2
...
2019-07-05 06:02:27
190.184.205.242 attack
Unauthorized connection attempt from IP address 190.184.205.242 on Port 445(SMB)
2019-07-05 06:18:13
51.254.99.208 attackspambots
Jul  4 14:59:47 minden010 sshd[23486]: Failed password for root from 51.254.99.208 port 55844 ssh2
Jul  4 15:01:53 minden010 sshd[24235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.99.208
Jul  4 15:01:55 minden010 sshd[24235]: Failed password for invalid user ubuntu from 51.254.99.208 port 52412 ssh2
...
2019-07-05 06:17:38
51.15.235.193 attackspam
Jul  4 14:31:47 work-partkepr sshd\[4113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.235.193  user=root
Jul  4 14:31:49 work-partkepr sshd\[4113\]: Failed password for root from 51.15.235.193 port 36346 ssh2
...
2019-07-05 06:14:27
155.93.255.177 attack
Many RDP login attempts detected by IDS script
2019-07-05 06:07:14
189.3.152.194 attack
SSH Bruteforce Attack
2019-07-05 06:18:42
45.76.187.56 attackbotsspam
Automatic report - Web App Attack
2019-07-05 06:01:35
77.20.216.19 attackbotsspam
Jul  4 20:42:38 lvps5-35-247-183 sshd[21945]: Invalid user pi from 77.20.216.19
Jul  4 20:42:39 lvps5-35-247-183 sshd[21947]: Invalid user pi from 77.20.216.19
Jul  4 20:42:40 lvps5-35-247-183 sshd[21945]: Failed password for invalid user pi from 77.20.216.19 port 40108 ssh2
Jul  4 20:42:40 lvps5-35-247-183 sshd[21945]: Connection closed by 77.20.216.19 [preauth]
Jul  4 20:42:41 lvps5-35-247-183 sshd[21947]: Failed password for invalid user pi from 77.20.216.19 port 40110 ssh2
Jul  4 20:42:41 lvps5-35-247-183 sshd[21947]: Connection closed by 77.20.216.19 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.20.216.19
2019-07-05 06:08:05

Recently Reported IPs

248.141.71.142 86.120.120.2 15.173.41.158 187.37.42.85
91.121.220.180 86.162.35.131 228.64.49.76 47.63.40.170
80.28.96.112 203.6.148.24 111.10.5.50 94.49.63.240
27.69.1.75 117.245.202.166 123.23.121.47 155.133.223.24
188.19.189.10 99.45.215.215 152.250.123.3 223.179.231.163