Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: TOT Public Company Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Unauthorized connection attempt from IP address 1.20.249.242 on Port 445(SMB)
2019-08-30 22:15:11
Comments on same subnet:
IP Type Details Datetime
1.20.249.21 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 10:22:49
1.20.249.190 attack
Hits on port : 8291
2020-02-11 20:27:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.249.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59921
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.20.249.242.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 30 22:14:34 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 242.249.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 242.249.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.197.180.102 attack
Nov 18 21:36:41 kapalua sshd\[11422\]: Invalid user tanvi from 138.197.180.102
Nov 18 21:36:41 kapalua sshd\[11422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102
Nov 18 21:36:43 kapalua sshd\[11422\]: Failed password for invalid user tanvi from 138.197.180.102 port 33046 ssh2
Nov 18 21:40:33 kapalua sshd\[11859\]: Invalid user grammens from 138.197.180.102
Nov 18 21:40:33 kapalua sshd\[11859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102
2019-11-19 16:33:18
84.201.30.89 attackbots
Nov 19 05:16:11 firewall sshd[3961]: Failed password for invalid user zp from 84.201.30.89 port 43012 ssh2
Nov 19 05:19:41 firewall sshd[4069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.30.89  user=root
Nov 19 05:19:43 firewall sshd[4069]: Failed password for root from 84.201.30.89 port 52932 ssh2
...
2019-11-19 16:25:46
87.18.72.91 attackbots
Automatic report - Port Scan Attack
2019-11-19 16:36:03
185.156.73.45 attack
11/19/2019-02:03:43.130923 185.156.73.45 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-19 16:01:23
5.249.159.139 attack
Nov 18 22:06:51 web1 sshd\[24051\]: Invalid user hung from 5.249.159.139
Nov 18 22:06:51 web1 sshd\[24051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.159.139
Nov 18 22:06:53 web1 sshd\[24051\]: Failed password for invalid user hung from 5.249.159.139 port 39288 ssh2
Nov 18 22:10:42 web1 sshd\[24434\]: Invalid user asahbi from 5.249.159.139
Nov 18 22:10:42 web1 sshd\[24434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.159.139
2019-11-19 16:12:53
119.28.29.169 attackspambots
Nov 19 08:42:21 srv-ubuntu-dev3 sshd[97981]: Invalid user helpme from 119.28.29.169
Nov 19 08:42:21 srv-ubuntu-dev3 sshd[97981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.29.169
Nov 19 08:42:21 srv-ubuntu-dev3 sshd[97981]: Invalid user helpme from 119.28.29.169
Nov 19 08:42:23 srv-ubuntu-dev3 sshd[97981]: Failed password for invalid user helpme from 119.28.29.169 port 33982 ssh2
Nov 19 08:46:24 srv-ubuntu-dev3 sshd[98270]: Invalid user sudesh from 119.28.29.169
Nov 19 08:46:24 srv-ubuntu-dev3 sshd[98270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.29.169
Nov 19 08:46:24 srv-ubuntu-dev3 sshd[98270]: Invalid user sudesh from 119.28.29.169
Nov 19 08:46:26 srv-ubuntu-dev3 sshd[98270]: Failed password for invalid user sudesh from 119.28.29.169 port 42736 ssh2
Nov 19 08:50:22 srv-ubuntu-dev3 sshd[98567]: Invalid user rituit from 119.28.29.169
...
2019-11-19 16:11:52
127.0.0.1 attack
Test Connectivity
2019-11-19 16:15:30
148.66.132.190 attackspam
2019-11-19T07:32:19.659890abusebot.cloudsearch.cf sshd\[743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190  user=root
2019-11-19 16:11:31
206.225.86.170 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-19 16:20:01
51.89.57.123 attackbotsspam
Nov 19 02:42:17 server sshd\[10178\]: Failed password for invalid user admin from 51.89.57.123 port 43674 ssh2
Nov 19 11:01:08 server sshd\[6324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip123.ip-51-89-57.eu  user=root
Nov 19 11:01:10 server sshd\[6324\]: Failed password for root from 51.89.57.123 port 37554 ssh2
Nov 19 11:08:47 server sshd\[7979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip123.ip-51-89-57.eu  user=root
Nov 19 11:08:49 server sshd\[7979\]: Failed password for root from 51.89.57.123 port 36728 ssh2
...
2019-11-19 16:24:21
91.182.119.251 attackbotsspam
Nov 19 08:52:48 sd-53420 sshd\[10881\]: Invalid user football from 91.182.119.251
Nov 19 08:52:48 sd-53420 sshd\[10881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.182.119.251
Nov 19 08:52:50 sd-53420 sshd\[10881\]: Failed password for invalid user football from 91.182.119.251 port 17209 ssh2
Nov 19 08:57:10 sd-53420 sshd\[12049\]: Invalid user yywhbtj!! from 91.182.119.251
Nov 19 08:57:10 sd-53420 sshd\[12049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.182.119.251
...
2019-11-19 15:59:21
103.219.112.61 attackspambots
Nov 19 08:30:16 h2177944 sshd\[2804\]: Invalid user PCORP1000 from 103.219.112.61 port 59892
Nov 19 08:30:16 h2177944 sshd\[2804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.61
Nov 19 08:30:18 h2177944 sshd\[2804\]: Failed password for invalid user PCORP1000 from 103.219.112.61 port 59892 ssh2
Nov 19 08:34:51 h2177944 sshd\[2956\]: Invalid user kouba from 103.219.112.61 port 54920
...
2019-11-19 16:21:56
95.170.95.251 attack
Nov 19 09:51:11 tuotantolaitos sshd[23902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.170.95.251
Nov 19 09:51:13 tuotantolaitos sshd[23902]: Failed password for invalid user kuczka from 95.170.95.251 port 48496 ssh2
...
2019-11-19 16:15:15
49.234.203.5 attack
Nov 19 07:10:24 ns382633 sshd\[5094\]: Invalid user testuser from 49.234.203.5 port 32852
Nov 19 07:10:24 ns382633 sshd\[5094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.203.5
Nov 19 07:10:26 ns382633 sshd\[5094\]: Failed password for invalid user testuser from 49.234.203.5 port 32852 ssh2
Nov 19 07:26:40 ns382633 sshd\[7847\]: Invalid user shs from 49.234.203.5 port 38744
Nov 19 07:26:40 ns382633 sshd\[7847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.203.5
2019-11-19 16:34:57
202.74.238.87 attackspambots
2019-11-19T08:32:09.789670abusebot-4.cloudsearch.cf sshd\[22602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.74.238.87  user=daemon
2019-11-19 16:32:25

Recently Reported IPs

125.27.205.31 118.70.183.45 180.108.13.207 118.69.71.143
14.162.176.166 2.181.180.254 178.32.128.70 182.253.140.73
165.255.222.47 123.24.205.109 49.234.27.45 115.78.5.239
152.136.67.176 58.57.177.46 36.89.187.239 180.95.148.224
117.81.5.16 112.104.30.106 66.181.179.237 146.88.240.6