Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: Tata Teleservices Ltd

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-15 03:35:08
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.98.134.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63232
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.98.134.42.			IN	A

;; AUTHORITY SECTION:
.			519	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101402 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 15 03:35:04 CST 2019
;; MSG SIZE  rcvd: 116
Host info
42.134.98.14.in-addr.arpa domain name pointer static-42.134.98.14-tataidc.co.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.134.98.14.in-addr.arpa	name = static-42.134.98.14-tataidc.co.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.120.234.12 attack
Nov 15 22:10:51 lnxded64 sshd[4231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.234.12
Nov 15 22:10:51 lnxded64 sshd[4231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.234.12
2019-11-16 05:11:01
49.39.156.47 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/49.39.156.47/ 
 
 IN - 1H : (70)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IN 
 NAME ASN : ASN55836 
 
 IP : 49.39.156.47 
 
 CIDR : 49.39.0.0/16 
 
 PREFIX COUNT : 234 
 
 UNIQUE IP COUNT : 3798272 
 
 
 ATTACKS DETECTED ASN55836 :  
  1H - 1 
  3H - 3 
  6H - 12 
 12H - 30 
 24H - 34 
 
 DateTime : 2019-11-15 15:37:15 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-16 05:05:36
128.199.55.13 attackspam
$f2bV_matches
2019-11-16 05:38:57
95.213.177.122 attackbotsspam
11/15/2019-14:13:48.956782 95.213.177.122 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-16 05:07:44
106.12.5.148 attackbots
Nov 15 19:20:04 OPSO sshd\[22209\]: Invalid user leslie from 106.12.5.148 port 41014
Nov 15 19:20:04 OPSO sshd\[22209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.5.148
Nov 15 19:20:06 OPSO sshd\[22209\]: Failed password for invalid user leslie from 106.12.5.148 port 41014 ssh2
Nov 15 19:24:05 OPSO sshd\[22622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.5.148  user=root
Nov 15 19:24:07 OPSO sshd\[22622\]: Failed password for root from 106.12.5.148 port 47838 ssh2
2019-11-16 05:22:25
77.85.106.132 attack
[Fri Nov 15 11:36:50.912878 2019] [:error] [pid 162507] [client 77.85.106.132:33773] [client 77.85.106.132] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "91"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 21)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "127.0.0.1"] [uri "/cgi-bin/ViewLog.asp"] [unique_id "Xc64AjGRh487OmvNeZkUygAAAAU"]
...
2019-11-16 05:21:23
122.228.19.80 attackspam
15.11.2019 20:50:46 Connection to port 1023 blocked by firewall
2019-11-16 05:33:00
87.241.138.143 attackspam
Automatic report - Banned IP Access
2019-11-16 05:36:59
192.3.70.16 attack
RCE Exploits of Redis Based on Master-Slave Replication to install Xmrig Trojan Miner,
2019-11-16 05:09:32
92.118.37.86 attackspam
11/15/2019-15:43:35.842540 92.118.37.86 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-16 05:00:49
196.52.43.85 attackbotsspam
Fail2Ban Ban Triggered
2019-11-16 05:18:19
200.86.33.140 attack
2019-11-15T16:37:46.019498shield sshd\[25387\]: Invalid user strohm from 200.86.33.140 port 25675
2019-11-15T16:37:46.023921shield sshd\[25387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pc-140-33-86-200.cm.vtr.net
2019-11-15T16:37:48.454470shield sshd\[25387\]: Failed password for invalid user strohm from 200.86.33.140 port 25675 ssh2
2019-11-15T16:42:55.575773shield sshd\[26724\]: Invalid user backup from 200.86.33.140 port 1871
2019-11-15T16:42:55.580121shield sshd\[26724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pc-140-33-86-200.cm.vtr.net
2019-11-16 05:09:44
92.118.37.84 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-16 05:29:19
217.17.117.26 attackspambots
Connection by 217.17.117.26 on port: 23 got caught by honeypot at 11/15/2019 6:43:33 PM
2019-11-16 05:00:27
81.20.99.84 attackspam
19/11/15@09:36:46: FAIL: Alarm-Intrusion address from=81.20.99.84
...
2019-11-16 05:22:43

Recently Reported IPs

66.237.168.223 201.62.79.25 182.137.149.3 79.148.229.123
128.23.213.9 86.139.218.88 218.58.241.141 88.71.214.112
162.232.6.237 93.230.166.243 152.92.183.15 177.139.81.40
110.182.61.38 75.229.138.85 137.59.51.73 110.156.193.143
146.203.106.255 197.225.116.158 115.28.173.64 63.150.106.131