Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: Hong Kong Telecommunications (HKT) Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
May 28 14:01:06 fhem-rasp sshd[8838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.49.142.70 
May 28 14:01:08 fhem-rasp sshd[8838]: Failed password for invalid user admin from 116.49.142.70 port 41861 ssh2
...
2020-05-28 23:30:56
Comments on same subnet:
IP Type Details Datetime
116.49.142.48 attackspam
Honeypot attack, port: 5555, PTR: n11649142048.netvigator.com.
2020-03-01 23:22:25
116.49.142.48 attackbotsspam
5555/tcp
[2020-02-25]1pkt
2020-02-26 05:22:22
116.49.142.137 attack
Unauthorized connection attempt detected from IP address 116.49.142.137 to port 5555 [J]
2020-01-31 00:43:51
116.49.142.137 attackbots
Unauthorized connection attempt detected from IP address 116.49.142.137 to port 5555 [J]
2020-01-14 23:07:12
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.49.142.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.49.142.70.			IN	A

;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020052800 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 28 23:30:41 CST 2020
;; MSG SIZE  rcvd: 117
Host info
70.142.49.116.in-addr.arpa domain name pointer n11649142070.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.142.49.116.in-addr.arpa	name = n11649142070.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
62.210.89.231 attackbotsspam
SIPVicious Scanner Detection, PTR: 62-210-89-231.rev.poneytelecom.eu.
2019-11-13 06:57:53
1.203.80.78 attack
47 failed attempt(s) in the last 24h
2019-11-13 07:11:21
124.65.18.102 attackbotsspam
11/12/2019-17:27:24.252414 124.65.18.102 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 7
2019-11-13 06:38:55
27.254.194.99 attack
Nov 12 12:51:42 auw2 sshd\[4117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.194.99  user=mysql
Nov 12 12:51:43 auw2 sshd\[4117\]: Failed password for mysql from 27.254.194.99 port 43412 ssh2
Nov 12 12:55:49 auw2 sshd\[4404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.194.99  user=root
Nov 12 12:55:51 auw2 sshd\[4404\]: Failed password for root from 27.254.194.99 port 52618 ssh2
Nov 12 12:59:57 auw2 sshd\[4699\]: Invalid user mcconney from 27.254.194.99
2019-11-13 07:02:48
50.62.177.236 attackbotsspam
xmlrpc attack
2019-11-13 06:47:15
42.99.180.135 attack
detected by Fail2Ban
2019-11-13 06:49:51
14.169.255.16 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/14.169.255.16/ 
 
 VN - 1H : (45)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : VN 
 NAME ASN : ASN45899 
 
 IP : 14.169.255.16 
 
 CIDR : 14.169.224.0/19 
 
 PREFIX COUNT : 2411 
 
 UNIQUE IP COUNT : 7209216 
 
 
 ATTACKS DETECTED ASN45899 :  
  1H - 9 
  3H - 10 
  6H - 12 
 12H - 16 
 24H - 24 
 
 DateTime : 2019-11-12 23:36:42 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-13 06:51:33
167.114.152.139 attack
Nov 13 00:36:34 sauna sshd[164842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139
Nov 13 00:36:35 sauna sshd[164842]: Failed password for invalid user login from 167.114.152.139 port 54840 ssh2
...
2019-11-13 06:56:48
188.80.113.181 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/188.80.113.181/ 
 
 PT - 1H : (11)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PT 
 NAME ASN : ASN3243 
 
 IP : 188.80.113.181 
 
 CIDR : 188.80.0.0/14 
 
 PREFIX COUNT : 14 
 
 UNIQUE IP COUNT : 1704960 
 
 
 ATTACKS DETECTED ASN3243 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 3 
 24H - 5 
 
 DateTime : 2019-11-12 23:36:42 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-13 06:51:56
221.238.227.43 attackspam
*Joomla JDatabaseDriverMysqli unserialize code execution attempt
*vBulletin pre-authenticated command injection attempt
2019-11-13 07:11:00
123.206.87.154 attack
Nov 12 13:01:49 auw2 sshd\[4869\]: Invalid user kalsom from 123.206.87.154
Nov 12 13:01:49 auw2 sshd\[4869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.87.154
Nov 12 13:01:52 auw2 sshd\[4869\]: Failed password for invalid user kalsom from 123.206.87.154 port 59754 ssh2
Nov 12 13:05:37 auw2 sshd\[5327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.87.154  user=root
Nov 12 13:05:40 auw2 sshd\[5327\]: Failed password for root from 123.206.87.154 port 39148 ssh2
2019-11-13 07:07:35
81.12.81.26 attackbots
47 failed attempt(s) in the last 24h
2019-11-13 07:09:42
79.137.72.171 attackspambots
Nov 12 12:35:03 auw2 sshd\[2352\]: Invalid user diann from 79.137.72.171
Nov 12 12:35:03 auw2 sshd\[2352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.ip-79-137-72.eu
Nov 12 12:35:05 auw2 sshd\[2352\]: Failed password for invalid user diann from 79.137.72.171 port 34149 ssh2
Nov 12 12:38:52 auw2 sshd\[2651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.ip-79-137-72.eu  user=www-data
Nov 12 12:38:54 auw2 sshd\[2651\]: Failed password for www-data from 79.137.72.171 port 53163 ssh2
2019-11-13 07:05:33
41.83.157.191 attackspam
MYH,DEF GET /downloader/
2019-11-13 07:10:43
85.117.62.234 attackspambots
B: Abusive content scan (301)
2019-11-13 06:39:08

Recently Reported IPs

115.16.216.180 221.165.96.133 57.101.155.97 236.248.236.112
79.242.142.241 47.158.221.53 247.220.2.205 134.141.178.78
103.58.152.97 213.215.221.174 36.56.3.169 52.111.191.212
139.65.221.3 150.134.169.234 246.24.217.240 36.79.87.155
5.140.202.125 72.53.98.26 22.126.2.108 223.112.168.162