Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: Microsoft Corporation

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Unauthorized connection attempt detected from IP address 104.47.142.2 to port 1433
2020-07-22 16:44:51
attack
Jul 18 08:40:31 localhost sshd\[12593\]: Invalid user admin from 104.47.142.2 port 37196
Jul 18 08:40:31 localhost sshd\[12593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.47.142.2
Jul 18 08:40:33 localhost sshd\[12593\]: Failed password for invalid user admin from 104.47.142.2 port 37196 ssh2
...
2020-07-18 19:54:22
attack
Jul 15 12:48:42 mout sshd[5974]: Invalid user admin from 104.47.142.2 port 27559
Jul 15 12:48:44 mout sshd[5974]: Failed password for invalid user admin from 104.47.142.2 port 27559 ssh2
Jul 15 12:48:45 mout sshd[5974]: Disconnected from invalid user admin 104.47.142.2 port 27559 [preauth]
2020-07-15 18:51:09
attack
Jul 14 21:05:15 mailman sshd[10717]: Invalid user admin from 104.47.142.2
2020-07-15 10:11:06
attack
Jun 30 07:21:44 vmd48417 sshd[18521]: Failed password for root from 104.47.142.2 port 13774 ssh2
2020-06-30 14:20:01
attackspam
SSH brute-force attempt
2020-06-26 14:27:53
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.47.142.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.47.142.2.			IN	A

;; AUTHORITY SECTION:
.			273	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062600 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 26 14:27:41 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 2.142.47.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 2.142.47.104.in-addr.arpa.: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
80.21.147.85 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.21.147.85
Failed password for invalid user cron from 80.21.147.85 port 22796 ssh2
Invalid user jian from 80.21.147.85 port 35571
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.21.147.85
Failed password for invalid user jian from 80.21.147.85 port 35571 ssh2
2019-07-03 15:03:49
92.118.37.81 attack
03.07.2019 07:37:43 Connection to port 21209 blocked by firewall
2019-07-03 15:46:46
184.105.247.252 attackbots
6379/tcp 30005/tcp 8443/tcp...
[2019-05-03/07-02]120pkt,22pt.(tcp)
2019-07-03 15:31:48
43.242.210.138 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 02:24:30,876 INFO [amun_request_handler] PortScan Detected on Port: 445 (43.242.210.138)
2019-07-03 15:14:14
108.179.224.14 attackbots
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"master@createsimpledomain.icu","user_login":"mastericuuu","wp-submit":"Register"}
2019-07-03 15:07:20
154.118.240.38 attackspambots
Unauthorized connection attempt from IP address 154.118.240.38 on Port 445(SMB)
2019-07-03 15:36:34
223.82.101.42 attackbots
Jul  3 05:52:28 MK-Soft-VM4 sshd\[3883\]: Invalid user bailey from 223.82.101.42 port 42367
Jul  3 05:52:28 MK-Soft-VM4 sshd\[3883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.82.101.42
Jul  3 05:52:31 MK-Soft-VM4 sshd\[3883\]: Failed password for invalid user bailey from 223.82.101.42 port 42367 ssh2
...
2019-07-03 15:33:58
114.39.117.113 attackspambots
23/tcp 37215/tcp
[2019-06-30/07-03]2pkt
2019-07-03 14:58:09
115.153.166.2 attack
Jul  1 13:37:57 eola postfix/smtpd[25187]: connect from unknown[115.153.166.2]
Jul  1 13:37:57 eola postfix/smtpd[25194]: connect from unknown[115.153.166.2]
Jul  1 13:38:01 eola postfix/smtpd[25194]: lost connection after AUTH from unknown[115.153.166.2]
Jul  1 13:38:01 eola postfix/smtpd[25194]: disconnect from unknown[115.153.166.2] ehlo=1 auth=0/1 commands=1/2
Jul  1 13:38:01 eola postfix/smtpd[25194]: connect from unknown[115.153.166.2]
Jul  1 13:38:04 eola postfix/smtpd[25194]: lost connection after AUTH from unknown[115.153.166.2]
Jul  1 13:38:04 eola postfix/smtpd[25194]: disconnect from unknown[115.153.166.2] ehlo=1 auth=0/1 commands=1/2
Jul  1 13:38:05 eola postfix/smtpd[25194]: connect from unknown[115.153.166.2]
Jul  1 13:38:08 eola postfix/smtpd[25194]: lost connection after AUTH from unknown[115.153.166.2]
Jul  1 13:38:08 eola postfix/smtpd[25194]: disconnect from unknown[115.153.166.2] ehlo=1 auth=0/1 commands=1/2
Jul  1 13:38:08 eola postfix/smtpd[25194]........
-------------------------------
2019-07-03 15:14:32
58.59.2.26 attackspam
03.07.2019 07:29:50 SSH access blocked by firewall
2019-07-03 15:44:56
113.87.192.213 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 02:23:59,596 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.87.192.213)
2019-07-03 15:24:22
178.128.193.158 attack
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"master@createsimpledomain.icu","user_login":"mastericuuu","wp-submit":"Register"}
2019-07-03 15:23:47
184.154.74.70 attackbotsspam
10000/tcp 993/tcp 22/tcp...
[2019-05-03/07-03]10pkt,10pt.(tcp)
2019-07-03 15:45:43
186.18.69.238 attack
port scan and connect, tcp 23 (telnet)
2019-07-03 15:17:06
125.167.54.55 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 01:53:57,427 INFO [shellcode_manager] (125.167.54.55) no match, writing hexdump (772746b1e93cb0588171a704604304ca :9440) - SMB (Unknown)
2019-07-03 15:07:02

Recently Reported IPs

128.14.181.170 183.111.96.20 94.25.181.60 190.103.178.13
51.91.157.255 150.129.8.34 171.231.19.86 106.53.219.82
49.151.13.208 114.67.110.48 69.168.97.50 49.232.115.165
173.61.211.192 180.182.78.31 180.253.27.245 187.36.177.111
84.235.40.97 52.187.76.241 36.75.15.26 192.241.233.235