Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Zhengzhou Gainet Computer Network Technology Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-08-27 01:45:35
attack
Unauthorized connection attempt detected from IP address 116.255.242.20 to port 1433
2020-05-31 01:13:29
attack
Unauthorized connection attempt detected from IP address 116.255.242.20 to port 1433
2020-01-02 20:06:05
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.255.242.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.255.242.20.			IN	A

;; AUTHORITY SECTION:
.			339	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010200 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 02 20:05:58 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 20.242.255.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 20.242.255.116.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
80.211.240.230 attack
Jun 23 05:24:11 vpn01 sshd\[23629\]: Invalid user marthe from 80.211.240.230
Jun 23 05:24:11 vpn01 sshd\[23629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.240.230
Jun 23 05:24:13 vpn01 sshd\[23629\]: Failed password for invalid user marthe from 80.211.240.230 port 53334 ssh2
2019-06-23 13:52:17
88.100.39.117 attackspam
Jun 23 05:13:56 web sshd\[8954\]: Invalid user fn from 88.100.39.117
Jun 23 05:13:56 web sshd\[8954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.39.broadband5.iol.cz 
Jun 23 05:13:58 web sshd\[8954\]: Failed password for invalid user fn from 88.100.39.117 port 41525 ssh2
Jun 23 05:15:13 web sshd\[8960\]: Invalid user sa from 88.100.39.117
Jun 23 05:15:13 web sshd\[8960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.39.broadband5.iol.cz 
...
2019-06-23 14:12:36
216.172.183.202 attack
Dictionary attack on login resource.
2019-06-23 13:38:30
51.38.238.87 attackbotsspam
Invalid user mou from 51.38.238.87 port 54142
2019-06-23 14:11:04
177.74.182.4 attackbotsspam
$f2bV_matches
2019-06-23 13:19:30
103.36.126.247 attackspam
proto=tcp  .  spt=48298  .  dpt=25  .     (listed on Blocklist de  Jun 22)     (27)
2019-06-23 13:44:05
119.123.78.77 attack
445/tcp
[2019-06-22]1pkt
2019-06-23 13:43:40
178.128.150.79 attackbots
Jun 23 05:06:34 [host] sshd[18807]: Invalid user ddd from 178.128.150.79
Jun 23 05:06:34 [host] sshd[18807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.79
Jun 23 05:06:36 [host] sshd[18807]: Failed password for invalid user ddd from 178.128.150.79 port 57010 ssh2
2019-06-23 13:48:28
186.224.184.73 attackspambots
$f2bV_matches
2019-06-23 13:55:42
185.94.111.1 attackspam
23.06.2019 05:57:02 Connection to port 1900 blocked by firewall
2019-06-23 14:02:58
191.53.222.65 attack
$f2bV_matches
2019-06-23 13:35:52
168.232.213.242 attackbotsspam
Web App Attack
2019-06-23 13:22:12
182.253.1.213 attackspam
Jun 23 02:55:30 core01 sshd\[28765\]: Invalid user yong from 182.253.1.213 port 55594
Jun 23 02:55:30 core01 sshd\[28765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.1.213
...
2019-06-23 14:12:05
192.241.175.115 attackbotsspam
ports scanning
2019-06-23 14:04:31
176.110.30.243 attack
Portscan or hack attempt detected by psad/fwsnort
2019-06-23 13:13:22

Recently Reported IPs

14.192.210.130 1.55.174.223 1.53.88.213 223.71.167.165
222.88.124.179 219.150.233.202 203.205.26.245 183.146.124.50
146.63.108.220 138.139.172.30 64.158.231.224 183.71.198.219
12.126.189.226 185.238.155.27 78.54.116.150 182.151.196.62
172.175.10.252 76.16.49.203 50.243.227.199 85.32.46.109