Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ban Du

Region: Chiang Rai

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
119.42.109.120 attack
20/8/19@23:50:45: FAIL: Alarm-Network address from=119.42.109.120
20/8/19@23:50:45: FAIL: Alarm-Network address from=119.42.109.120
...
2020-08-20 16:33:22
119.42.109.147 attackbots
unauthorized connection attempt
2020-02-16 17:34:44
119.42.109.230 attackspam
Unauthorized connection attempt detected from IP address 119.42.109.230 to port 23 [J]
2020-02-05 09:14:31
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.109.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10889
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.109.26.			IN	A

;; AUTHORITY SECTION:
.			453	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031201 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 13 09:57:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 26.109.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 26.109.42.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.209.216.70 attackbotsspam
Unauthorized connection attempt detected from IP address 82.209.216.70 to port 8080 [J]
2020-01-18 20:50:07
78.234.142.90 attack
Jan 18 13:32:06 XXX sshd[21893]: Invalid user user3 from 78.234.142.90 port 46398
2020-01-18 21:11:05
94.191.20.179 attackspambots
Jan 18 12:52:31 pornomens sshd\[3364\]: Invalid user alibaba from 94.191.20.179 port 51120
Jan 18 12:52:31 pornomens sshd\[3364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.20.179
Jan 18 12:52:34 pornomens sshd\[3364\]: Failed password for invalid user alibaba from 94.191.20.179 port 51120 ssh2
...
2020-01-18 20:48:36
185.176.27.166 attackspam
Jan 18 13:59:57 debian-2gb-nbg1-2 kernel: \[1611688.079684\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.166 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=36785 PROTO=TCP SPT=43223 DPT=5103 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-18 21:14:21
187.214.232.194 attack
Unauthorized connection attempt detected from IP address 187.214.232.194 to port 8000 [J]
2020-01-18 21:00:07
89.45.45.178 attack
Jan 18 19:57:27 itv-usvr-02 sshd[17712]: Invalid user simone from 89.45.45.178 port 32932
Jan 18 19:57:27 itv-usvr-02 sshd[17712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.45.178
Jan 18 19:57:27 itv-usvr-02 sshd[17712]: Invalid user simone from 89.45.45.178 port 32932
Jan 18 19:57:29 itv-usvr-02 sshd[17712]: Failed password for invalid user simone from 89.45.45.178 port 32932 ssh2
Jan 18 19:59:50 itv-usvr-02 sshd[17724]: Invalid user xguest from 89.45.45.178 port 54524
2020-01-18 21:23:35
200.209.174.76 attackbotsspam
Unauthorized connection attempt detected from IP address 200.209.174.76 to port 2220 [J]
2020-01-18 21:26:48
46.101.77.58 attack
Jan 18 13:26:26 XXX sshd[21812]: Invalid user office from 46.101.77.58 port 49120
2020-01-18 21:12:12
212.95.130.4 attack
Jan 18 14:00:00 mout sshd[23249]: Invalid user admin from 212.95.130.4 port 64782
2020-01-18 21:04:50
45.148.235.179 attackspambots
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="
2020-01-18 21:25:20
115.97.52.120 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-01-18 21:17:45
183.251.83.101 attackbotsspam
Unauthorized connection attempt detected from IP address 183.251.83.101 to port 1433 [J]
2020-01-18 21:00:24
177.73.142.200 attackbots
Unauthorized connection attempt detected from IP address 177.73.142.200 to port 8080 [J]
2020-01-18 21:02:53
49.88.112.63 attackspambots
Jan 18 13:59:40 legacy sshd[30268]: Failed password for root from 49.88.112.63 port 31198 ssh2
Jan 18 13:59:53 legacy sshd[30268]: error: maximum authentication attempts exceeded for root from 49.88.112.63 port 31198 ssh2 [preauth]
Jan 18 14:00:00 legacy sshd[30275]: Failed password for root from 49.88.112.63 port 2645 ssh2
...
2020-01-18 21:07:01
188.6.161.77 attack
(sshd) Failed SSH login from 188.6.161.77 (HU/Hungary/dslbc06a14d.fixip.t-online.hu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 18 14:11:42 ubnt-55d23 sshd[27808]: Invalid user admin from 188.6.161.77 port 54269
Jan 18 14:11:44 ubnt-55d23 sshd[27808]: Failed password for invalid user admin from 188.6.161.77 port 54269 ssh2
2020-01-18 21:13:54

Recently Reported IPs

119.42.123.44 119.42.70.124 195.177.114.184 119.41.13.3
119.42.113.72 181.161.98.39 61.92.32.175 119.42.67.41
119.42.67.254 119.42.109.73 119.42.123.62 119.42.122.76
119.42.123.111 119.42.113.78 119.42.70.186 119.42.67.249
119.41.201.179 119.42.121.154 79.106.96.229 119.41.165.143