Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
117.42.29.109 attackbotsspam
Unauthorized connection attempt detected from IP address 117.42.29.109 to port 26
2020-06-30 03:27:42
117.42.208.53 attack
Unauthorized connection attempt detected from IP address 117.42.208.53 to port 6656 [T]
2020-01-29 17:02:39
117.42.235.55 attackspambots
Unauthorized connection attempt detected from IP address 117.42.235.55 to port 6656 [T]
2020-01-26 08:59:18
117.42.223.63 attack
Unauthorized connection attempt detected from IP address 117.42.223.63 to port 23 [J]
2020-01-13 18:42:20
117.42.29.118 attackspambots
Unauthorized connection attempt from IP address 117.42.29.118 on Port 445(SMB)
2019-09-05 17:29:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.42.2.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29450
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.42.2.89.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 15:10:30 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 89.2.42.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.2.42.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
35.187.234.161 attackbots
Nov 28 07:19:24 server sshd\[30151\]: Invalid user ryghseter from 35.187.234.161 port 47220
Nov 28 07:19:24 server sshd\[30151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.234.161
Nov 28 07:19:26 server sshd\[30151\]: Failed password for invalid user ryghseter from 35.187.234.161 port 47220 ssh2
Nov 28 07:26:48 server sshd\[18419\]: Invalid user ssh from 35.187.234.161 port 54616
Nov 28 07:26:48 server sshd\[18419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.234.161
2019-11-28 13:55:20
183.80.212.169 attackspam
Unauthorised access (Nov 28) SRC=183.80.212.169 LEN=52 TTL=109 ID=23112 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 28) SRC=183.80.212.169 LEN=52 TTL=109 ID=20301 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 28) SRC=183.80.212.169 LEN=52 TTL=109 ID=1057 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-28 13:57:41
218.92.0.137 attack
2019-11-23 02:49:24,612 fail2ban.actions        [774]: NOTICE  [sshd] Ban 218.92.0.137
2019-11-25 02:23:49,188 fail2ban.actions        [774]: NOTICE  [sshd] Ban 218.92.0.137
2019-11-25 07:41:22,400 fail2ban.actions        [774]: NOTICE  [sshd] Ban 218.92.0.137
...
2019-11-28 14:12:50
128.199.47.148 attackbotsspam
Nov 28 07:27:02 server sshd\[16348\]: Invalid user www from 128.199.47.148
Nov 28 07:27:02 server sshd\[16348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.47.148 
Nov 28 07:27:03 server sshd\[16348\]: Failed password for invalid user www from 128.199.47.148 port 49496 ssh2
Nov 28 07:57:30 server sshd\[24249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.47.148  user=daemon
Nov 28 07:57:32 server sshd\[24249\]: Failed password for daemon from 128.199.47.148 port 35070 ssh2
...
2019-11-28 13:45:28
91.99.73.70 attack
Automatic report - XMLRPC Attack
2019-11-28 14:18:32
198.98.52.141 attack
Nov 28 00:35:44 frobozz sshd\[15640\]: Invalid user mongodb from 198.98.52.141 port 32806
Nov 28 00:35:44 frobozz sshd\[15630\]: Invalid user redhat from 198.98.52.141 port 32776
Nov 28 00:35:44 frobozz sshd\[15634\]: Invalid user glassfish from 198.98.52.141 port 32792
Nov 28 00:35:44 frobozz sshd\[15641\]: Invalid user admin from 198.98.52.141 port 32802
Nov 28 00:35:44 frobozz sshd\[15629\]: Invalid user ubuntu from 198.98.52.141 port 32770
Nov 28 00:35:44 frobozz sshd\[15627\]: Invalid user devops from 198.98.52.141 port 32784
Nov 28 00:35:44 frobozz sshd\[15637\]: Invalid user studant from 198.98.52.141 port 32808
Nov 28 00:35:44 frobozz sshd\[15636\]: Invalid user tomcat from 198.98.52.141 port 32798
Nov 28 00:35:44 frobozz sshd\[15633\]: Invalid user vagrant from 198.98.52.141 port 32778
Nov 28 00:35:44 frobozz sshd\[15635\]: Invalid user jboss from 198.98.52.141 port 32800
Nov 28 00:35:44 frobozz sshd\[15638\]: Invalid user oracle from 198.98.52.141 port 32804
Nov 28 00:35:44 frobozz sshd\[15632\]: In
2019-11-28 13:38:08
123.30.174.85 attack
Nov 28 06:15:10 markkoudstaal sshd[19275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.174.85
Nov 28 06:15:12 markkoudstaal sshd[19275]: Failed password for invalid user internet from 123.30.174.85 port 54924 ssh2
Nov 28 06:24:10 markkoudstaal sshd[20262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.174.85
2019-11-28 13:48:40
211.220.27.191 attackspam
Invalid user jakov from 211.220.27.191 port 41008
2019-11-28 14:15:34
71.226.38.243 attackspambots
Nov 28 05:57:15 vps sshd[25342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.226.38.243 
Nov 28 05:57:15 vps sshd[25343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.226.38.243 
Nov 28 05:57:17 vps sshd[25342]: Failed password for invalid user pi from 71.226.38.243 port 55614 ssh2
...
2019-11-28 13:53:58
42.59.193.223 attackspam
Unauthorised access (Nov 28) SRC=42.59.193.223 LEN=40 TTL=49 ID=42300 TCP DPT=23 WINDOW=31111 SYN
2019-11-28 14:01:44
182.61.49.179 attackspam
Nov 28 11:03:00 vibhu-HP-Z238-Microtower-Workstation sshd\[31724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.179  user=root
Nov 28 11:03:02 vibhu-HP-Z238-Microtower-Workstation sshd\[31724\]: Failed password for root from 182.61.49.179 port 34232 ssh2
Nov 28 11:10:48 vibhu-HP-Z238-Microtower-Workstation sshd\[32150\]: Invalid user symbria from 182.61.49.179
Nov 28 11:10:48 vibhu-HP-Z238-Microtower-Workstation sshd\[32150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.179
Nov 28 11:10:49 vibhu-HP-Z238-Microtower-Workstation sshd\[32150\]: Failed password for invalid user symbria from 182.61.49.179 port 37698 ssh2
...
2019-11-28 13:44:18
112.29.172.224 attack
Nov 28 07:27:19 server2 sshd\[24945\]: Invalid user test from 112.29.172.224
Nov 28 07:28:19 server2 sshd\[24979\]: Invalid user test from 112.29.172.224
Nov 28 07:31:03 server2 sshd\[25225\]: Invalid user test from 112.29.172.224
Nov 28 07:31:15 server2 sshd\[25249\]: Invalid user test from 112.29.172.224
Nov 28 07:35:36 server2 sshd\[25516\]: Invalid user test from 112.29.172.224
Nov 28 07:36:24 server2 sshd\[25550\]: Invalid user test from 112.29.172.224
2019-11-28 13:59:56
139.159.217.217 attackbotsspam
11/27/2019-23:56:49.319039 139.159.217.217 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-28 14:12:05
140.143.242.159 attack
Nov 28 04:52:18 124388 sshd[16664]: Invalid user mountsys from 140.143.242.159 port 57954
Nov 28 04:52:18 124388 sshd[16664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.242.159
Nov 28 04:52:18 124388 sshd[16664]: Invalid user mountsys from 140.143.242.159 port 57954
Nov 28 04:52:20 124388 sshd[16664]: Failed password for invalid user mountsys from 140.143.242.159 port 57954 ssh2
Nov 28 04:56:59 124388 sshd[16726]: Invalid user thorbjoern from 140.143.242.159 port 33892
2019-11-28 14:06:43
49.51.162.170 attackspam
Nov 15 23:00:59 microserver sshd[53966]: Invalid user fabriceg from 49.51.162.170 port 52522
Nov 15 23:00:59 microserver sshd[53966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.162.170
Nov 15 23:01:01 microserver sshd[53966]: Failed password for invalid user fabriceg from 49.51.162.170 port 52522 ssh2
Nov 15 23:04:35 microserver sshd[54216]: Invalid user lena from 49.51.162.170 port 33724
Nov 15 23:04:35 microserver sshd[54216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.162.170
Nov 15 23:15:35 microserver sshd[56037]: Invalid user admin999 from 49.51.162.170 port 33810
Nov 15 23:15:35 microserver sshd[56037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.162.170
Nov 15 23:15:37 microserver sshd[56037]: Failed password for invalid user admin999 from 49.51.162.170 port 33810 ssh2
Nov 15 23:19:18 microserver sshd[56236]: Invalid user psb from 49.51.162.170 port 43
2019-11-28 13:45:43

Recently Reported IPs

205.172.3.80 153.2.118.66 34.51.129.3 162.17.235.231
39.169.194.234 134.174.232.192 36.196.104.26 2.143.203.192
252.17.211.126 82.241.42.3 184.191.97.61 90.119.236.111
201.18.203.90 156.5.179.116 232.181.73.243 227.5.9.197
228.76.169.215 92.172.225.133 250.158.227.21 228.134.205.20