IP address: 140.207.46.136

Host rating:

2.0

out of 45 votes

Last update: 2019-10-05

Host details

Unknown
China
Pudong
AS17621 China Unicom Shanghai network
See comments

Reported breaches

  • Brute force attack
Report breach

Whois record

The publicly-available Whois record found at whois.apnic.net server.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '140.206.0.0 - 140.207.255.255'

% Abuse contact for '140.206.0.0 - 140.207.255.255' is '[email protected]'

inetnum:        140.206.0.0 - 140.207.255.255
netname:        UNICOM-SH
descr:          CHINA UNICOM Shanghai city network
descr:          China Unicom
descr:          No.21,Jin Rong Street,Beijing,100033
descr:          P.R.China
country:        CN
admin-c:        CH1302-AP
tech-c:         CH1302-AP
remarks:        service provider
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CNCGROUP-SH
mnt-routes:     MAINT-CNCGROUP-RR
mnt-irt:        IRT-CU-CN
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
last-modified:  2016-05-04T00:29:37Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         [email protected]
abuse-mailbox:  [email protected]
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-10-23T05:59:13Z
source:         APNIC

person:         ChinaUnicom Hostmaster
nic-hdl:        CH1302-AP
e-mail:         [email protected]
address:        No.21,Jin-Rong Street
address:        Beijing,100033
address:        P.R.China
phone:          +86-10-66259764
fax-no:         +86-10-66259764
country:        CN
mnt-by:         MAINT-CNCGROUP
last-modified:  2017-08-17T06:13:16Z
source:         APNIC

% Information related to '0.0.0.0 - 255.255.255.255'

inetnum:        0.0.0.0 - 255.255.255.255
netname:        IANA-BLOCK
descr:          General placeholder reference for all IPv4 addresses
remarks:        ------------------------------------------------------
remarks:
remarks:        Important:
remarks:
remarks:        This registration object does not contain
remarks:        specific registration details.
remarks:
remarks:        This registration object is used only as a
remarks:        general placeholder for all IPv4 addresses
remarks:        and may include:
remarks:
remarks:        - reserved address ranges
remarks:        - private use ranges
remarks:        - multicast ranges
remarks:        - address ranges administered by RIRs (Regional
remarks:        Internet Registries)
remarks:
remarks:        If your query does not return an address range
remarks:        more specific than 0.0.0.0 - 255.255.255.255, it
remarks:        means the address is not administered by any RIR.
remarks:        For more specific information on the use of this
remarks:        IPv4 address space, see the Internet Assigned
remarks:        Numbers Authority (IANA) website at:
remarks:
remarks:        http://www.iana.org
remarks:
remarks:        ------------------------------------------------------
country:        ID
admin-c:        IA55-AP
tech-c:         IH123-AP
mnt-by:         MNT-APJII-ID
mnt-lower:      MNT-APJII-ID
mnt-irt:        IRT-IDNIC-ID
status:         ALLOCATED PORTABLE
last-modified:  2018-10-23T03:07:27Z
source:         IDNIC

irt:            IRT-IDNIC-ID
address:        INDONESIA NETWORK INFORMATION CENTER
address:        Cyber Building 11th Floor
address:        Jl. Kuningan Barat No.8
address:        Jakarta Selatan 12710
e-mail:         [email protected]
abuse-mailbox:  [email protected]
admin-c:        IA55-AP
tech-c:         IH123-AP
auth:           # Filtered
mnt-by:         MNT-APJII-ID
last-modified:  2018-01-22T00:22:06Z
source:         IDNIC

role:           ID-NIC ADMINISTRATORS
address:        Indonesian Network Information Center
address:        ID-NIC
address:        Cyber Building 11th Floor
address:        Jakarta 12710
country:        ID
phone:          +62-21-52960634
fax-no:         +62-21-52960635
e-mail:         [email protected]
remarks:        spam and abuse report : [email protected]
remarks:        technical and routing : [email protected]
remarks:        hostmasters : [email protected]
remarks:        ID-NIC administrators role object
admin-c:        YF295-AP
tech-c:         YF295-AP
nic-hdl:        IA55-AP
notify:         [email protected]
mnt-by:         MNT-APJII-ID
last-modified:  2016-07-18T03:42:15Z
source:         IDNIC

role:           ID-NIC HOSTMASTERS
address:        Indonesian Network Information Center
address:        ID-NIC
address:        Cyber Building 11th Floor
address:        Jakarta 12710
country:        ID
phone:          +62-21-52960634
fax-no:         +62-21-52960635
e-mail:         [email protected]
remarks:        spam and abuse report : [email protected]
remarks:        technical and routing : [email protected]
remarks:        administrative request : [email protected]
remarks:        IDNIC hostmasters role object
admin-c:        YF295-AP
tech-c:         YF295-AP
nic-hdl:        IH123-AP
notify:         [email protected]
mnt-by:         MNT-APJII-ID
last-modified:  2016-05-13T12:16:40Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.15-47 (WHOIS-US4)


User comments

45 security incident(s) reported by users

BHD Honeypot
Brute force attack
2019-10-05

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 11 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: '[email protected]#$', 'Odin1434', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot', '119278Liang', '[email protected]@sonic'
      
BHD Honeypot
Brute force attack
2019-10-04

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 16 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: 'Odin1434', '[email protected]#$', '119278Liang', '[email protected]@sonic', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot'
      
Anonymous
Brute force attack
2019-10-04

Attempt to login from IP: 140.207.46.136 via SSH by trying many passwords and usernames
BHD Honeypot
Brute force attack
2019-10-03

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 8 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: 'Odin1434', '[email protected]#$', '119278Liang', '[email protected]@sonic', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot'
      
Anonymous
Brute force attack
2019-10-03

Attempt to login from IP: 140.207.46.136 via SSH by trying many passwords and usernames
BHD Honeypot
Brute force attack
2019-10-01

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 8 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: 'Odin1434', '[email protected]#$', '119278Liang', '[email protected]@sonic', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot'
      
Anonymous
Brute force attack
2019-10-01

Attempt to login from IP: 140.207.46.136 via SSH by trying many passwords and usernames
BHD Honeypot
Brute force attack
2019-09-30

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 11 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: '[email protected]#$', 'Odin1434', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot', '119278Liang', '[email protected]@sonic'
      
BHD Honeypot
Brute force attack
2019-09-29

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 16 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: 'Odin1434', '[email protected]#$', '119278Liang', '[email protected]@sonic', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot'
      
Anonymous
Brute force attack
2019-09-29

Attempt to login from IP: 140.207.46.136 via SSH by trying many passwords and usernames
BHD Honeypot
Brute force attack
2019-09-27

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 14 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'butter', 'app'
The most commonly used passwords: '[email protected]#$', '119278Liang', 'Odin1434', '[email protected]@sonic', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot'
      
Anonymous
Brute force attack
2019-09-27

Attempt to login from IP: 140.207.46.136 via SSH by trying many passwords and usernames
BHD Honeypot
Brute force attack
2019-09-26

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 14 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'butter', 'app'
The most commonly used passwords: '[email protected]#$', 'rooooooooooooooooooooooooooooooooooooooooooooot', 'Odin1434', '[email protected]@sonic', 'S0p0rt3ADM2o19', '119278Liang'
      
Anonymous
Brute force attack
2019-09-26

Attempt to login from IP: 140.207.46.136 via SSH by trying many passwords and usernames
BHD Honeypot
Brute force attack
2019-09-25

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 32 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: 'Odin1434', '[email protected]#$', '119278Liang', '[email protected]@sonic', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot'
      
BHD Honeypot
Brute force attack
2019-09-24

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 16 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: 'Odin1434', '[email protected]#$', '119278Liang', '[email protected]@sonic', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot'
      
Anonymous
Brute force attack
2019-09-24

Attempt to login from IP: 140.207.46.136 via SSH by trying many passwords and usernames
BHD Honeypot
Brute force attack
2019-09-22

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 8 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: 'Odin1434', '[email protected]#$', '119278Liang', '[email protected]@sonic', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot'
      
Anonymous
Brute force attack
2019-09-22

Attempt to login from IP: 140.207.46.136 via SSH by trying many passwords and usernames
BHD Honeypot
Brute force attack
2019-09-20

In the last 24h, the attacker attempted to log in to our ssh honeypot by trying 8 different combinations of usernames and passwords.
The most commonly used usernames: 'root', 'app', 'butter'
The most commonly used passwords: 'Odin1434', '[email protected]#$', '119278Liang', '[email protected]@sonic', 'S0p0rt3ADM2o19', 'rooooooooooooooooooooooooooooooooooooooooooooot'
      

Blacklist

Near real-time, easy to use data feed containing IPs reported on our website.

Bronze

$3

Updated daily

Learn More

Silver

$15

Updated every hour

Learn More

Gold

$30

Updated every 10 minutes

Learn More

Remarks

Black hat directory contains this IP address, because Internet users reported it as an address making unsolicited, nagging requests. We make every effort to ensure that the information contained in the Black hat directory are correct and up to date. The database is developed and updated by Internet users and moderators.

If you have any reliable information regarding malicious activity originating from this IP address, please share it with others and fill in the 'Report breach' form. It is prohibited from adding personally identifiable information.

Below breach categories are used in the database:

  • Denial of service attack - this attack is accomplished by flooding the target with massive amount of requests in order to overload the targeted system
  • Brute force attack - this category encompasses attempts to login to machine by trying many passwords and usernames
  • Backdoor attack - this category represents bypassing authentication by hidden programs or services to obtain remote access to a computer or trojan activity
  • Port scan - represents attackers identifying running services on the targeted machine by probing a server for open ports
  • Malicious bot - this category encompasses all bots performing unsolicited requests or ignoring robots.txt file
  • Anonymous proxy - public proxies like Tor, I2P relays or anonymous VPNs are often used by attacker to hide his identity
  • Web attack - attempts to exploit web application security flaws
  • CMS attack - attempts to exploit CMS vulnerability
  • App vulnerability attack - attempts to exploit other applications vulnerability
  • Web spam - encompasses all kind of HTTP spamming
  • Email spam - encompasses all kind of E-mail spamming
  • Dodgy activity - this category encompasses superfluous, dodgy requests

Similar hosts

Hosts with the same ASN

Report breach!

Rate host 140.207.46.136