Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: Capital Online Data Service HK Co Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
firewall-block, port(s): 1521/tcp
2019-11-21 21:50:49
attackbotsspam
11/11/2019-23:43:34.705122 164.52.42.134 Protocol: 6 ET SCAN Suspicious inbound to Oracle SQL port 1521
2019-11-12 07:22:49
Comments on same subnet:
IP Type Details Datetime
164.52.42.6 attack
May 24 05:41:23 web01.agentur-b-2.de postfix/smtpd[512662]: NOQUEUE: reject: RCPT from unknown[164.52.42.6]: 554 5.7.1 Service unavailable; Client host [164.52.42.6] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/164.52.42.6; from= to= proto=ESMTP helo=
May 24 05:41:24 web01.agentur-b-2.de postfix/smtpd[512662]: NOQUEUE: reject: RCPT from unknown[164.52.42.6]: 554 5.7.1 Service unavailable; Client host [164.52.42.6] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/164.52.42.6; from= to= proto=ESMTP helo=
May 24 05:41:30 web01.agentur-b-2.de postfix/smtpd[512662]: NOQUEUE: reject: RCPT from unknown[164.52.42.6]: 554 5.7.1 Service unavailable; Client host [164.52.42.6] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/16
2020-05-24 20:08:10
164.52.42.6 attackbotsspam
Unauthorized connection attempt from IP address 164.52.42.6 on Port 445(SMB)
2019-10-26 02:11:26
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.52.42.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.52.42.134.			IN	A

;; AUTHORITY SECTION:
.			361	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111101 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 12 07:22:44 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 134.42.52.164.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
** server can't find 134.42.52.164.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
106.104.115.213 attackspam
unauthorized connection attempt
2020-02-19 15:55:26
121.164.60.230 attack
unauthorized connection attempt
2020-02-19 16:11:01
143.202.116.93 attackspam
unauthorized connection attempt
2020-02-19 16:34:07
177.93.70.234 attackbotsspam
unauthorized connection attempt
2020-02-19 15:52:21
117.54.222.18 attack
unauthorized connection attempt
2020-02-19 16:28:57
81.91.239.148 attackspambots
unauthorized connection attempt
2020-02-19 16:13:32
14.240.95.166 attack
Port 9530 scan denied
2020-02-19 16:31:54
113.22.10.172 attack
1582088190 - 02/19/2020 05:56:30 Host: 113.22.10.172/113.22.10.172 Port: 445 TCP Blocked
2020-02-19 16:06:06
116.232.164.120 attackbots
unauthorized connection attempt
2020-02-19 16:12:03
212.156.69.114 attackbots
unauthorized connection attempt
2020-02-19 15:50:48
27.208.44.144 attack
unauthorized connection attempt
2020-02-19 16:15:40
92.87.113.71 attackspam
unauthorized connection attempt
2020-02-19 15:56:42
162.241.65.175 attack
Feb 19 05:56:26 ArkNodeAT sshd\[22403\]: Invalid user ts3 from 162.241.65.175
Feb 19 05:56:26 ArkNodeAT sshd\[22403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.65.175
Feb 19 05:56:27 ArkNodeAT sshd\[22403\]: Failed password for invalid user ts3 from 162.241.65.175 port 58936 ssh2
2020-02-19 15:53:12
119.202.22.168 attack
unauthorized connection attempt
2020-02-19 16:11:32
52.16.36.128 attackspam
unauthorized connection attempt
2020-02-19 15:57:05

Recently Reported IPs

141.229.16.81 73.131.198.210 45.218.240.127 49.96.220.89
171.210.49.147 79.133.67.180 189.17.104.96 35.154.205.168
173.178.210.186 114.40.160.38 220.29.123.184 171.242.127.198
80.173.95.189 35.78.128.188 41.9.249.28 46.66.137.130
97.187.72.135 111.241.188.4 130.179.24.50 107.134.69.139