Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: Hong Kong Broadband Network Ltd

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
5555/tcp 5555/tcp 5555/tcp
[2019-10-06/11-16]3pkt
2019-11-16 14:28:25
attack
firewall-block, port(s): 5555/tcp
2019-08-26 05:16:39
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.136.42.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14636
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.136.42.121.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 26 05:16:34 CST 2019
;; MSG SIZE  rcvd: 117
Host info
121.42.136.14.in-addr.arpa domain name pointer 014136042121.ctinets.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
121.42.136.14.in-addr.arpa	name = 014136042121.ctinets.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.20.231.251 attackspambots
" "
2019-11-26 00:33:31
2606:4700:30::681f:4ade attack
Nov 25 14:37:32   DDOS Attack: SRC=2606:4700:0030:0000:0000:0000:681f:4ade DST=[Masked] LEN=72 TC=0 HOPLIMIT=60 FLOWLBL=725310 PROTO=TCP SPT=443 DPT=45342 WINDOW=27200 RES=0x00 ACK SYN URGP=0
2019-11-26 00:15:11
81.218.146.213 attackbotsspam
81.218.146.213 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-26 00:16:36
81.30.144.122 attack
firewall-block, port(s): 1433/tcp
2019-11-26 00:01:58
218.92.0.181 attackspam
Nov 25 17:21:47 ns381471 sshd[4683]: Failed password for root from 218.92.0.181 port 53017 ssh2
Nov 25 17:22:01 ns381471 sshd[4683]: error: maximum authentication attempts exceeded for root from 218.92.0.181 port 53017 ssh2 [preauth]
2019-11-26 00:22:31
188.138.163.85 attack
Port scan: Attack repeated for 24 hours
2019-11-26 00:14:00
112.85.42.180 attackspambots
Nov 25 06:14:02 sachi sshd\[29861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
Nov 25 06:14:04 sachi sshd\[29861\]: Failed password for root from 112.85.42.180 port 57484 ssh2
Nov 25 06:14:24 sachi sshd\[29884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
Nov 25 06:14:27 sachi sshd\[29884\]: Failed password for root from 112.85.42.180 port 23879 ssh2
Nov 25 06:14:52 sachi sshd\[29936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
2019-11-26 00:28:05
222.186.180.223 attackspam
SSH Brute Force, server-1 sshd[19372]: Failed password for root from 222.186.180.223 port 36608 ssh2
2019-11-26 00:31:12
63.80.184.105 attackbotsspam
Nov 25 15:52:00  exim[22236]: [1\56] 1iZFiX-0005me-Et H=eggs.sapuxfiori.com (eggs.towersotokuafor.co) [63.80.184.105] F= rejected after DATA: This message scored 103.2 spam points.
2019-11-26 00:35:43
185.143.221.186 attack
11/25/2019-11:01:04.735736 185.143.221.186 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-26 00:32:30
49.116.18.25 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-11-26 00:29:52
77.93.203.216 attackspam
firewall-block, port(s): 9600/udp
2019-11-26 00:03:40
63.88.23.183 attackbotsspam
63.88.23.183 was recorded 8 times by 6 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 8, 58, 636
2019-11-26 00:09:51
176.31.172.40 attack
Nov 25 16:58:00 sso sshd[4049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.172.40
Nov 25 16:58:02 sso sshd[4049]: Failed password for invalid user naifou from 176.31.172.40 port 33582 ssh2
...
2019-11-26 00:11:25
218.92.0.160 attackbotsspam
SSH Brute Force, server-1 sshd[19594]: Failed password for root from 218.92.0.160 port 52398 ssh2
2019-11-26 00:26:25

Recently Reported IPs

90.153.112.246 209.99.168.117 188.74.52.219 190.66.124.75
92.124.188.24 68.45.195.199 195.69.159.242 190.113.215.106
63.27.2.90 172.247.53.96 40.68.160.253 25.101.238.119
27.74.50.254 106.105.203.27 121.23.40.58 129.211.27.96
177.67.49.122 92.34.76.60 83.166.140.143 46.101.48.191