Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: Viettel Group

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
1593742756 - 07/03/2020 04:19:16 Host: 171.242.70.46/171.242.70.46 Port: 445 TCP Blocked
2020-07-03 20:18:53
Comments on same subnet:
IP Type Details Datetime
171.242.70.245 attackbots
Lines containing failures of 171.242.70.245
Jan 26 05:31:20 own sshd[16743]: Invalid user admin from 171.242.70.245 port 41053
Jan 26 05:31:20 own sshd[16743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.242.70.245
Jan 26 05:31:22 own sshd[16743]: Failed password for invalid user admin from 171.242.70.245 port 41053 ssh2
Jan 26 05:31:22 own sshd[16743]: Connection closed by invalid user admin 171.242.70.245 port 41053 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=171.242.70.245
2020-01-26 20:14:07
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 171.242.70.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;171.242.70.46.			IN	A

;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070300 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 03 20:18:48 CST 2020
;; MSG SIZE  rcvd: 117
Host info
46.70.242.171.in-addr.arpa domain name pointer dynamic-ip-adsl.viettel.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.70.242.171.in-addr.arpa	name = dynamic-ip-adsl.viettel.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.36.217.142 attackspambots
Nov 11 20:31:27 ldap01vmsma01 sshd[19064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.217.142
Nov 11 20:31:30 ldap01vmsma01 sshd[19064]: Failed password for invalid user jalib from 89.36.217.142 port 46888 ssh2
...
2019-11-12 05:18:06
92.46.122.138 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-12 05:26:09
114.116.180.115 attack
ENG,DEF GET /w00tw00t.at.blackhats.romanian.anti-sec:)
2019-11-12 05:16:04
218.164.110.248 attack
Honeypot attack, port: 23, PTR: 218-164-110-248.dynamic-ip.hinet.net.
2019-11-12 05:17:30
80.211.132.145 attack
2019-11-11T20:36:34.327599abusebot-5.cloudsearch.cf sshd\[6387\]: Invalid user helli from 80.211.132.145 port 44158
2019-11-12 04:55:59
104.236.81.204 attackbotsspam
Nov 11 20:11:38 localhost sshd\[3217\]: Invalid user oracle1 from 104.236.81.204 port 59817
Nov 11 20:11:38 localhost sshd\[3217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.81.204
Nov 11 20:11:40 localhost sshd\[3217\]: Failed password for invalid user oracle1 from 104.236.81.204 port 59817 ssh2
...
2019-11-12 05:04:10
81.218.186.117 attack
Honeypot attack, port: 23, PTR: bzq-218-186-117.red.bezeqint.net.
2019-11-12 05:20:23
180.168.36.86 attackspambots
Nov 11 04:32:56 eddieflores sshd\[13440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.36.86  user=root
Nov 11 04:32:59 eddieflores sshd\[13440\]: Failed password for root from 180.168.36.86 port 2866 ssh2
Nov 11 04:37:18 eddieflores sshd\[13745\]: Invalid user bettencourt from 180.168.36.86
Nov 11 04:37:18 eddieflores sshd\[13745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.36.86
Nov 11 04:37:20 eddieflores sshd\[13745\]: Failed password for invalid user bettencourt from 180.168.36.86 port 2867 ssh2
2019-11-12 05:02:32
50.239.143.195 attackbots
Automatic report - Banned IP Access
2019-11-12 05:05:01
49.67.155.40 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-12 05:00:09
109.121.162.48 attack
port scan and connect, tcp 80 (http)
2019-11-12 04:56:34
36.73.75.51 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-12 05:01:54
158.69.222.2 attackbots
Nov 11 17:43:52 v22018086721571380 sshd[17863]: Failed password for invalid user bonesvoll from 158.69.222.2 port 49930 ssh2
2019-11-12 05:11:51
200.164.217.210 attackspam
2019-11-11T17:14:15.762212abusebot-5.cloudsearch.cf sshd\[5014\]: Invalid user vnc from 200.164.217.210 port 38173
2019-11-12 04:56:13
177.43.72.253 attackspam
Spam trapped
2019-11-12 05:03:26

Recently Reported IPs

96.116.223.237 94.248.168.235 89.152.125.57 177.66.181.195
163.215.218.211 155.247.62.143 120.95.192.237 73.238.99.83
68.233.169.25 17.238.165.174 186.21.44.104 173.195.85.248
135.241.236.64 134.181.139.135 142.11.211.58 132.151.185.221
88.85.231.105 55.95.173.184 185.81.128.72 184.180.96.171