Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: CAT Telecom Public Company Ltd

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbots
Unauthorised access (May 11) SRC=119.42.118.53 LEN=40 PREC=0x20 TTL=242 ID=7664 TCP DPT=1433 WINDOW=1024 SYN
2020-05-12 05:06:31
Comments on same subnet:
IP Type Details Datetime
119.42.118.105 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 119.42.118.105 (-): 5 in the last 3600 secs - Wed Dec 19 22:11:54 2018
2020-02-07 09:37:05
119.42.118.201 attackspam
1,90-10/02 [bc00/m01] PostRequest-Spammer scoring: nairobi
2019-11-07 16:23:52
119.42.118.157 attackspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 02:27:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.118.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41735
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.42.118.53.			IN	A

;; AUTHORITY SECTION:
.			443	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051101 1800 900 604800 86400

;; Query time: 218 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 12 05:06:28 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 53.118.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.118.42.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.75.64.59 attack
Unauthorized connection attempt detected from IP address 106.75.64.59 to port 8443
2020-01-02 20:48:20
61.164.246.45 attack
Jan  2 10:21:42 vmd26974 sshd[14133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.246.45
Jan  2 10:21:44 vmd26974 sshd[14133]: Failed password for invalid user test from 61.164.246.45 port 33324 ssh2
...
2020-01-02 20:34:16
59.46.146.98 attack
Unauthorized connection attempt detected from IP address 59.46.146.98 to port 445
2020-01-02 20:36:04
1.53.68.120 attack
firewall-block, port(s): 23/tcp
2020-01-02 20:26:25
156.235.192.218 attackspam
Unauthorized connection attempt detected from IP address 156.235.192.218 to port 9200
2020-01-02 20:29:47
106.249.156.18 attackspambots
Unauthorized connection attempt detected from IP address 106.249.156.18 to port 4567
2020-01-02 20:47:56
222.73.136.205 attackbots
Unauthorized connection attempt detected from IP address 222.73.136.205 to port 445
2020-01-02 20:27:52
1.53.184.140 attack
Unauthorized connection attempt detected from IP address 1.53.184.140 to port 23
2020-01-02 20:53:21
60.170.103.131 attackspambots
Unauthorized connection attempt detected from IP address 60.170.103.131 to port 23
2020-01-02 21:00:48
5.188.86.156 attackspam
Automatic report - Banned IP Access
2020-01-02 20:26:00
123.93.79.22 attackspam
Unauthorized connection attempt detected from IP address 123.93.79.22 to port 23
2020-01-02 20:30:54
113.53.187.209 attackspam
Unauthorized connection attempt detected from IP address 113.53.187.209 to port 8081
2020-01-02 20:22:14
42.119.78.122 attackspam
Unauthorized connection attempt detected from IP address 42.119.78.122 to port 23
2020-01-02 20:38:17
49.235.138.41 attackspam
Unauthorized connection attempt detected from IP address 49.235.138.41 to port 8088
2020-01-02 20:37:34
223.152.200.122 attackbotsspam
Unauthorized connection attempt detected from IP address 223.152.200.122 to port 81
2020-01-02 20:53:44

Recently Reported IPs

114.130.84.34 27.39.106.153 14.206.122.198 13.76.197.242
167.90.223.178 237.2.135.112 34.148.212.230 165.222.42.22
29.65.29.231 182.217.124.6 45.194.148.240 56.18.24.38
64.51.210.194 253.113.253.213 206.223.28.170 203.101.32.232
21.111.128.123 255.215.44.147 118.232.11.60 142.177.23.98