Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: Viettel Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Honeypot attack, port: 445, PTR: localhost.
2020-03-16 19:05:39
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.1.245.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57531
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;117.1.245.16.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031600 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 19:05:34 CST 2020
;; MSG SIZE  rcvd: 116
Host info
16.245.1.117.in-addr.arpa domain name pointer localhost.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.245.1.117.in-addr.arpa	name = localhost.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.223.244.12 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:45.
2019-09-28 00:27:00
78.128.113.114 attack
Sep 27 17:54:17 relay postfix/smtpd\[5109\]: warning: unknown\[78.128.113.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 27 17:54:25 relay postfix/smtpd\[24158\]: warning: unknown\[78.128.113.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 27 17:57:27 relay postfix/smtpd\[3767\]: warning: unknown\[78.128.113.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 27 17:57:36 relay postfix/smtpd\[16454\]: warning: unknown\[78.128.113.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 27 18:05:40 relay postfix/smtpd\[24157\]: warning: unknown\[78.128.113.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-28 00:18:32
217.61.4.5 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-28 00:16:33
78.173.204.13 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:36.
2019-09-28 00:41:01
83.240.250.147 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:41.
2019-09-28 00:33:35
134.209.147.198 attack
Sep 23 21:58:55 pl1server sshd[10732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198  user=r.r
Sep 23 21:58:56 pl1server sshd[10732]: Failed password for r.r from 134.209.147.198 port 41346 ssh2
Sep 23 21:58:57 pl1server sshd[10732]: Received disconnect from 134.209.147.198: 11: Bye Bye [preauth]
Sep 23 22:09:37 pl1server sshd[13008]: Invalid user yangzhao from 134.209.147.198
Sep 23 22:09:37 pl1server sshd[13008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198
Sep 23 22:09:39 pl1server sshd[13008]: Failed password for invalid user yangzhao from 134.209.147.198 port 47378 ssh2
Sep 23 22:09:39 pl1server sshd[13008]: Received disconnect from 134.209.147.198: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.209.147.198
2019-09-28 00:11:04
193.29.15.60 attackbots
09/27/2019-09:53:42.140522 193.29.15.60 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-28 00:12:55
94.97.104.135 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:46.
2019-09-28 00:25:02
222.186.175.161 attack
2019-09-27T15:53:35.338379hub.schaetter.us sshd\[2622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
2019-09-27T15:53:37.613406hub.schaetter.us sshd\[2622\]: Failed password for root from 222.186.175.161 port 23180 ssh2
2019-09-27T15:53:42.285006hub.schaetter.us sshd\[2622\]: Failed password for root from 222.186.175.161 port 23180 ssh2
2019-09-27T15:53:46.026129hub.schaetter.us sshd\[2622\]: Failed password for root from 222.186.175.161 port 23180 ssh2
2019-09-27T15:53:50.316488hub.schaetter.us sshd\[2622\]: Failed password for root from 222.186.175.161 port 23180 ssh2
...
2019-09-28 00:09:04
121.130.88.44 attackbots
Sep 27 04:44:35 hpm sshd\[10151\]: Invalid user ud from 121.130.88.44
Sep 27 04:44:35 hpm sshd\[10151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.88.44
Sep 27 04:44:37 hpm sshd\[10151\]: Failed password for invalid user ud from 121.130.88.44 port 59644 ssh2
Sep 27 04:49:37 hpm sshd\[10559\]: Invalid user ivan from 121.130.88.44
Sep 27 04:49:37 hpm sshd\[10559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.88.44
2019-09-28 00:14:49
45.142.195.150 attack
2019-09-27T17:06:58.486475beta postfix/smtpd[10314]: warning: unknown[45.142.195.150]: SASL LOGIN authentication failed: authentication failure
2019-09-27T17:07:40.537271beta postfix/smtpd[10314]: warning: unknown[45.142.195.150]: SASL LOGIN authentication failed: authentication failure
2019-09-27T17:08:22.133804beta postfix/smtpd[10314]: warning: unknown[45.142.195.150]: SASL LOGIN authentication failed: authentication failure
...
2019-09-28 00:14:25
31.44.117.74 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-27 23:58:51
103.247.88.0 attack
Excessive Port-Scanning
2019-09-28 00:47:17
93.110.55.250 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:46.
2019-09-28 00:25:31
66.186.181.47 attack
RDP Bruteforce
2019-09-28 00:04:37

Recently Reported IPs

5.15.4.113 134.119.241.229 103.116.12.84 90.189.147.38
1.4.186.152 213.230.117.137 187.34.122.235 31.169.5.235
177.236.49.4 183.16.102.238 119.47.119.47 112.133.251.29
42.113.99.17 39.75.177.80 190.220.14.104 186.24.217.1
203.56.4.104 197.25.227.104 103.241.109.134 189.111.197.135