Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ho Chi Minh City

Region: Ho Chi Minh

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.99.42.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54782
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.99.42.85.			IN	A

;; AUTHORITY SECTION:
.			347	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021090901 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 10 07:02:09 CST 2021
;; MSG SIZE  rcvd: 105
Host info
85.42.99.101.in-addr.arpa domain name pointer static.cmcti.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.42.99.101.in-addr.arpa	name = static.cmcti.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.2.217.0 attackbotsspam
Unauthorized connection attempt detected from IP address 27.2.217.0 to port 445
2019-12-13 20:42:19
23.251.142.181 attackbots
SSH Brute Force, server-1 sshd[12278]: Failed password for root from 23.251.142.181 port 36027 ssh2
2019-12-13 20:50:03
5.45.6.226 attackbotsspam
Unauthorized connection attempt detected from IP address 5.45.6.226 to port 445
2019-12-13 20:43:51
129.204.77.45 attackbots
Dec 13 05:54:43 ny01 sshd[21209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.45
Dec 13 05:54:45 ny01 sshd[21209]: Failed password for invalid user testing from 129.204.77.45 port 54163 ssh2
Dec 13 06:02:40 ny01 sshd[22566]: Failed password for root from 129.204.77.45 port 58221 ssh2
2019-12-13 20:54:43
104.236.38.105 attackbots
Dec 13 02:28:37 kapalua sshd\[19508\]: Invalid user southard from 104.236.38.105
Dec 13 02:28:38 kapalua sshd\[19508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105
Dec 13 02:28:40 kapalua sshd\[19508\]: Failed password for invalid user southard from 104.236.38.105 port 55860 ssh2
Dec 13 02:33:59 kapalua sshd\[20055\]: Invalid user akiba from 104.236.38.105
Dec 13 02:33:59 kapalua sshd\[20055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105
2019-12-13 20:36:27
115.110.207.116 attackspambots
2019-12-13T12:14:44.308877centos sshd\[30161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.110.207.116  user=root
2019-12-13T12:14:46.278889centos sshd\[30161\]: Failed password for root from 115.110.207.116 port 53112 ssh2
2019-12-13T12:20:51.678895centos sshd\[30375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.110.207.116  user=root
2019-12-13 20:29:45
223.247.223.194 attackbotsspam
Dec 13 02:27:08 php1 sshd\[15207\]: Invalid user absolom from 223.247.223.194
Dec 13 02:27:08 php1 sshd\[15207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.223.194
Dec 13 02:27:10 php1 sshd\[15207\]: Failed password for invalid user absolom from 223.247.223.194 port 40132 ssh2
Dec 13 02:34:33 php1 sshd\[16074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.223.194  user=backup
Dec 13 02:34:36 php1 sshd\[16074\]: Failed password for backup from 223.247.223.194 port 39074 ssh2
2019-12-13 20:48:42
201.163.180.183 attack
Dec 13 13:20:54 legacy sshd[5457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.180.183
Dec 13 13:20:56 legacy sshd[5457]: Failed password for invalid user thewall from 201.163.180.183 port 52577 ssh2
Dec 13 13:27:26 legacy sshd[5796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.180.183
...
2019-12-13 20:38:38
62.234.79.230 attack
Dec 13 10:33:29 server sshd\[29903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.79.230  user=root
Dec 13 10:33:31 server sshd\[29903\]: Failed password for root from 62.234.79.230 port 35809 ssh2
Dec 13 10:44:28 server sshd\[473\]: Invalid user feicat999888 from 62.234.79.230
Dec 13 10:44:28 server sshd\[473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.79.230 
Dec 13 10:44:31 server sshd\[473\]: Failed password for invalid user feicat999888 from 62.234.79.230 port 45470 ssh2
...
2019-12-13 20:28:26
46.43.49.90 attackbots
Dec 13 11:57:22 localhost sshd\[15256\]: Invalid user rpm from 46.43.49.90 port 39356
Dec 13 11:57:22 localhost sshd\[15256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.43.49.90
Dec 13 11:57:25 localhost sshd\[15256\]: Failed password for invalid user rpm from 46.43.49.90 port 39356 ssh2
Dec 13 12:03:02 localhost sshd\[15455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.43.49.90  user=root
Dec 13 12:03:04 localhost sshd\[15455\]: Failed password for root from 46.43.49.90 port 43922 ssh2
...
2019-12-13 20:52:50
59.145.221.103 attack
Dec 13 12:06:19 zeus sshd[10651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.145.221.103 
Dec 13 12:06:21 zeus sshd[10651]: Failed password for invalid user 1q2w1q2w3e from 59.145.221.103 port 60093 ssh2
Dec 13 12:15:18 zeus sshd[10974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.145.221.103 
Dec 13 12:15:20 zeus sshd[10974]: Failed password for invalid user test@1234 from 59.145.221.103 port 60754 ssh2
2019-12-13 20:26:06
120.70.101.103 attackbots
Dec 13 09:37:18 ns382633 sshd\[19860\]: Invalid user squid from 120.70.101.103 port 48226
Dec 13 09:37:18 ns382633 sshd\[19860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103
Dec 13 09:37:19 ns382633 sshd\[19860\]: Failed password for invalid user squid from 120.70.101.103 port 48226 ssh2
Dec 13 09:54:00 ns382633 sshd\[22750\]: Invalid user ching from 120.70.101.103 port 42423
Dec 13 09:54:00 ns382633 sshd\[22750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103
2019-12-13 20:36:08
182.61.163.126 attackbotsspam
sshd jail - ssh hack attempt
2019-12-13 20:51:16
82.196.4.66 attackspambots
<6 unauthorized SSH connections
2019-12-13 20:49:42
200.125.28.46 attack
$f2bV_matches
2019-12-13 20:46:30

Recently Reported IPs

47.57.229.175 23.221.224.9 68.13.230.200 60.13.230.200
54.205.69.200 52.96.87.226 52.96.44.162 52.96.33.82
52.96.183.34 52.96.111.18 52.182.141.63 52.182.112.66
52.114.144.101 52.114.142.227 52.114.142.108 52.114.133.28
52.114.128.205 52.114.194.132 52.111.229.3 34.237.73.95