Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: ChinaNet Yunnan Province Network

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt detected from IP address 61.138.222.34 to port 6656 [T]
2020-01-27 06:47:21
Comments on same subnet:
IP Type Details Datetime
61.138.222.68 attackbotsspam
Unauthorised access (Aug 14) SRC=61.138.222.68 LEN=40 TTL=49 ID=30875 TCP DPT=23 WINDOW=30607 SYN
2020-08-14 17:51:49
61.138.222.119 attackbotsspam
Unauthorized connection attempt detected from IP address 61.138.222.119 to port 6656 [T]
2020-01-30 18:06:46
61.138.222.203 attackbotsspam
Unauthorized connection attempt detected from IP address 61.138.222.203 to port 6656 [T]
2020-01-30 16:40:20
61.138.222.21 attackspam
Unauthorized connection attempt detected from IP address 61.138.222.21 to port 6656 [T]
2020-01-30 06:42:37
61.138.222.57 attack
Unauthorized connection attempt detected from IP address 61.138.222.57 to port 6656 [T]
2020-01-27 04:36:09
61.138.222.55 attack
badbot
2019-11-24 06:15:09
61.138.222.108 attack
badbot
2019-11-22 17:25:50
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.138.222.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;61.138.222.34.			IN	A

;; AUTHORITY SECTION:
.			568	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012601 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 06:47:18 CST 2020
;; MSG SIZE  rcvd: 117
Host info
34.222.138.61.in-addr.arpa domain name pointer 34.222.138.61.other.yx.yn.dynamic.163data.com.cn.
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

Non-authoritative answer:
34.222.138.61.in-addr.arpa	name = 34.222.138.61.other.yx.yn.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.64.108.66 attackspambots
2020-03-13T06:15:26.115344scmdmz1 sshd[30429]: Failed password for invalid user ubuntu from 217.64.108.66 port 53886 ssh2
2020-03-13T06:20:04.065856scmdmz1 sshd[30856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.64.108.66  user=root
2020-03-13T06:20:06.578741scmdmz1 sshd[30856]: Failed password for root from 217.64.108.66 port 45990 ssh2
...
2020-03-13 13:21:33
101.227.82.219 attackbots
3x Failed Password
2020-03-13 12:47:05
150.95.31.150 attackbots
no
2020-03-13 13:24:01
144.217.214.13 attackbots
Mar 13 06:56:27 hosting sshd[21259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip13.ip-144-217-214.net  user=root
Mar 13 06:56:29 hosting sshd[21259]: Failed password for root from 144.217.214.13 port 53920 ssh2
...
2020-03-13 13:24:44
118.48.211.197 attackspam
(sshd) Failed SSH login from 118.48.211.197 (KR/South Korea/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 13 04:57:23 ubnt-55d23 sshd[15685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.48.211.197  user=root
Mar 13 04:57:25 ubnt-55d23 sshd[15685]: Failed password for root from 118.48.211.197 port 58405 ssh2
2020-03-13 12:51:06
181.171.181.50 attackspam
Mar 13 04:52:15 mail sshd[27109]: Invalid user timemachine from 181.171.181.50
Mar 13 04:52:15 mail sshd[27109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.171.181.50
Mar 13 04:52:15 mail sshd[27109]: Invalid user timemachine from 181.171.181.50
Mar 13 04:52:18 mail sshd[27109]: Failed password for invalid user timemachine from 181.171.181.50 port 38910 ssh2
Mar 13 05:04:58 mail sshd[14658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.171.181.50  user=root
Mar 13 05:05:01 mail sshd[14658]: Failed password for root from 181.171.181.50 port 41652 ssh2
...
2020-03-13 13:08:45
185.211.245.198 attack
2020-03-13 05:44:00 dovecot_plain authenticator failed for \(swim.diverseenvironment.com.\) \[185.211.245.198\]: 535 Incorrect authentication data \(set_id=webmaster1@no-server.de\)
2020-03-13 05:44:05 dovecot_plain authenticator failed for \(swim.diverseenvironment.com.\) \[185.211.245.198\]: 535 Incorrect authentication data \(set_id=webmaster1@no-server.de\)
2020-03-13 05:44:07 dovecot_plain authenticator failed for \(swim.diverseenvironment.com.\) \[185.211.245.198\]: 535 Incorrect authentication data \(set_id=webmaster1@no-server.de\)
2020-03-13 05:44:07 dovecot_plain authenticator failed for \(swim.diverseenvironment.com.\) \[185.211.245.198\]: 535 Incorrect authentication data \(set_id=webmaster1\)
2020-03-13 05:44:08 dovecot_plain authenticator failed for \(swim.diverseenvironment.com.\) \[185.211.245.198\]: 535 Incorrect authentication data \(set_id=webmaster1@no-server.de\)
...
2020-03-13 13:00:02
121.175.246.222 attackspambots
Mar 13 05:09:59 Ubuntu-1404-trusty-64-minimal sshd\[30070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.175.246.222  user=root
Mar 13 05:10:01 Ubuntu-1404-trusty-64-minimal sshd\[30070\]: Failed password for root from 121.175.246.222 port 39554 ssh2
Mar 13 05:13:56 Ubuntu-1404-trusty-64-minimal sshd\[32390\]: Invalid user hessischermuehlenverein from 121.175.246.222
Mar 13 05:13:56 Ubuntu-1404-trusty-64-minimal sshd\[32390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.175.246.222
Mar 13 05:13:58 Ubuntu-1404-trusty-64-minimal sshd\[32390\]: Failed password for invalid user hessischermuehlenverein from 121.175.246.222 port 37312 ssh2
2020-03-13 12:51:53
64.227.1.29 attackspam
Mar 12 23:07:49 h2034429 sshd[22322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.1.29  user=r.r
Mar 12 23:07:50 h2034429 sshd[22322]: Failed password for r.r from 64.227.1.29 port 60100 ssh2
Mar 12 23:07:51 h2034429 sshd[22322]: Received disconnect from 64.227.1.29 port 60100:11: Bye Bye [preauth]
Mar 12 23:07:51 h2034429 sshd[22322]: Disconnected from 64.227.1.29 port 60100 [preauth]
Mar 12 23:10:48 h2034429 sshd[22423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.1.29  user=r.r
Mar 12 23:10:50 h2034429 sshd[22423]: Failed password for r.r from 64.227.1.29 port 51862 ssh2
Mar 12 23:10:50 h2034429 sshd[22423]: Received disconnect from 64.227.1.29 port 51862:11: Bye Bye [preauth]
Mar 12 23:10:50 h2034429 sshd[22423]: Disconnected from 64.227.1.29 port 51862 [preauth]
Mar 12 23:13:00 h2034429 sshd[22456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0........
-------------------------------
2020-03-13 13:08:24
115.236.168.35 attackbots
Mar 13 05:41:31 lnxweb62 sshd[15970]: Failed password for root from 115.236.168.35 port 51932 ssh2
Mar 13 05:44:14 lnxweb62 sshd[17180]: Failed password for root from 115.236.168.35 port 36382 ssh2
2020-03-13 13:19:09
218.92.0.148 attackbotsspam
Mar 13 10:42:56 areeb-Workstation sshd[12139]: Failed password for root from 218.92.0.148 port 20225 ssh2
Mar 13 10:43:02 areeb-Workstation sshd[12139]: Failed password for root from 218.92.0.148 port 20225 ssh2
...
2020-03-13 13:30:07
178.62.99.41 attack
March 13 2020, 00:33:00 [sshd] - Banned from the Mad Pony WordPress hosting platform by Fail2ban.
2020-03-13 12:53:48
222.186.175.151 attackbots
Mar 13 02:24:23 firewall sshd[19317]: Failed password for root from 222.186.175.151 port 40614 ssh2
Mar 13 02:24:32 firewall sshd[19317]: error: maximum authentication attempts exceeded for root from 222.186.175.151 port 40614 ssh2 [preauth]
Mar 13 02:24:32 firewall sshd[19317]: Disconnecting: Too many authentication failures [preauth]
...
2020-03-13 13:26:00
198.54.114.108 attackspam
xmlrpc attack
2020-03-13 13:18:39
36.155.114.126 attackspambots
Lines containing failures of 36.155.114.126
Mar 12 04:42:05 shared11 sshd[20207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.114.126  user=r.r
Mar 12 04:42:07 shared11 sshd[20207]: Failed password for r.r from 36.155.114.126 port 38471 ssh2
Mar 12 04:42:07 shared11 sshd[20207]: Received disconnect from 36.155.114.126 port 38471:11: Bye Bye [preauth]
Mar 12 04:42:07 shared11 sshd[20207]: Disconnected from authenticating user r.r 36.155.114.126 port 38471 [preauth]
Mar 12 04:47:25 shared11 sshd[21896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.114.126  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=36.155.114.126
2020-03-13 13:15:47

Recently Reported IPs

182.34.201.188 180.125.121.163 163.179.206.94 125.122.170.7
125.92.101.60 123.179.93.235 123.119.41.17 123.57.10.7
122.242.39.70 122.192.29.170 228.103.95.24 207.211.98.68
122.4.46.122 121.231.215.92 119.185.236.106 55.208.211.131
119.177.95.208 117.94.118.244 153.228.152.199 117.87.49.19