City: Ho Chi Minh City
Region: unknown
Country: Vietnam
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 171.250.126.104 | attackbotsspam | trying to access non-authorized port |
2020-05-28 17:20:24 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '171.224.0.0 - 171.255.255.255'
% Abuse contact for '171.224.0.0 - 171.255.255.255' is 'hm-changed@vnnic.vn'
inetnum: 171.224.0.0 - 171.255.255.255
netname: VIETTEL-VN
descr: Viettel Group
descr: No 1, Tran Huu Duc street, My Dinh 2 ward, Nam Tu Liem district, Ha Noi City
country: VN
admin-c: TVT8-AP
tech-c: NDT9-AP
status: ALLOCATED PORTABLE
mnt-irt: IRT-VNNIC-AP
mnt-by: MAINT-VN-VNNIC
last-modified: 2017-11-11T09:43:21Z
source: APNIC
irt: IRT-VNNIC-AP
address: Ha Noi, VietNam
phone: +84-24-35564944
fax-no: +84-24-37821462
e-mail: hm-changed@vnnic.vn
abuse-mailbox: hm-changed@vnnic.vn
admin-c: NTTT1-AP
tech-c: NTTT1-AP
auth: # Filtered
mnt-by: MAINT-VN-VNNIC
last-modified: 2025-11-17T23:08:34Z
source: APNIC
person: Nguyen Dang Tiep
address: Viettel Network Corporation
address: No 1, Tran Huu Duc street, My Dinh 2 ward, Nam Tu Liem district, Ha Noi City
country: VN
phone: +84-24-62989898
e-mail: soc@viettel.com.vn
nic-hdl: NDT9-AP
mnt-by: MAINT-VN-VIETEL
last-modified: 2017-11-11T09:40:35Z
source: APNIC
person: Tran Van Thanh
address: Viettel Network Corporation
address: No 1, Tran Huu Duc street, My Dinh 2 ward, Nam Tu Liem district, Ha Noi City
country: VN
phone: +84-24-62989898
e-mail: soc@viettel.com.vn
nic-hdl: TVT8-AP
mnt-by: MAINT-VN-VIETEL
last-modified: 2018-08-21T09:57:13Z
source: APNIC
% Information related to '171.224.0.0/11AS24086'
route: 171.224.0.0/11
descr: VIETTEL-VN
origin: AS24086
mnt-by: MAINT-VN-VNNIC
last-modified: 2025-08-14T17:12:04Z
source: APNIC
% Information related to '171.224.0.0/11AS38731'
route: 171.224.0.0/11
descr: VIETTEL-VN
origin: AS38731
mnt-by: MAINT-VN-VNNIC
last-modified: 2025-08-14T17:12:09Z
source: APNIC
% Information related to '171.224.0.0/11AS7552'
route: 171.224.0.0/11
descr: VIETTEL-VN
origin: AS7552
mnt-by: MAINT-VN-VNNIC
last-modified: 2025-08-14T17:11:59Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 171.250.126.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;171.250.126.114. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 07:56:44 CST 2026
;; MSG SIZE rcvd: 108
b'114.126.250.171.in-addr.arpa domain name pointer dynamic-adsl.viettel.vn.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
114.126.250.171.in-addr.arpa name = dynamic-ip-adsl.viettel.vn.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 67.205.144.244 | attackbots | Invalid user ix from 67.205.144.244 port 60377 |
2020-04-23 22:33:56 |
| 68.183.82.97 | attack | $f2bV_matches |
2020-04-23 22:48:02 |
| 185.176.221.212 | attack | Fail2Ban Ban Triggered |
2020-04-23 23:02:30 |
| 113.190.132.220 | attackspam | Unauthorized connection attempt from IP address 113.190.132.220 on Port 445(SMB) |
2020-04-23 23:09:12 |
| 58.187.66.131 | attack | Unauthorized connection attempt from IP address 58.187.66.131 on Port 445(SMB) |
2020-04-23 22:56:36 |
| 157.245.175.12 | attackspam | 2020-04-23T16:22:13.754278amanda2.illicoweb.com sshd\[25664\]: Invalid user admin from 157.245.175.12 port 60784 2020-04-23T16:22:13.758916amanda2.illicoweb.com sshd\[25664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.175.12 2020-04-23T16:22:15.758532amanda2.illicoweb.com sshd\[25664\]: Failed password for invalid user admin from 157.245.175.12 port 60784 ssh2 2020-04-23T16:26:16.779527amanda2.illicoweb.com sshd\[25808\]: Invalid user cx from 157.245.175.12 port 46662 2020-04-23T16:26:16.784756amanda2.illicoweb.com sshd\[25808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.175.12 ... |
2020-04-23 22:40:44 |
| 86.57.158.226 | attackbots | Unauthorized IMAP connection attempt |
2020-04-23 23:05:37 |
| 222.186.52.39 | attack | Apr 23 16:31:40 ovpn sshd\[27665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39 user=root Apr 23 16:31:42 ovpn sshd\[27665\]: Failed password for root from 222.186.52.39 port 35022 ssh2 Apr 23 16:31:53 ovpn sshd\[27711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39 user=root Apr 23 16:31:55 ovpn sshd\[27711\]: Failed password for root from 222.186.52.39 port 17656 ssh2 Apr 23 16:31:57 ovpn sshd\[27711\]: Failed password for root from 222.186.52.39 port 17656 ssh2 |
2020-04-23 22:35:08 |
| 34.218.64.167 | attack | WEB_SERVER 403 Forbidden |
2020-04-23 22:52:30 |
| 129.126.201.188 | attackbots | Apr 23 16:30:04 ns381471 sshd[1697]: Failed password for root from 129.126.201.188 port 54078 ssh2 |
2020-04-23 22:36:00 |
| 164.90.73.21 | attack | Blocked for recurring port scan. Time: Thu Apr 23. 10:24:16 2020 +0200 IP: 164.90.73.21 (IN/India/-) Temporary blocks that triggered the permanent block: Wed Apr 22 15:50:09 2020 *Port Scan* detected from 164.90.73.21 (IN/India/-). 11 hits in the last 141 seconds Wed Apr 22 20:27:58 2020 *Port Scan* detected from 164.90.73.21 (IN/India/-). 11 hits in the last 261 seconds Thu Apr 23 01:08:53 2020 *Port Scan* detected from 164.90.73.21 (IN/India/-). 11 hits in the last 216 seconds Thu Apr 23 05:44:46 2020 *Port Scan* detected from 164.90.73.21 (IN/India/-). 11 hits in the last 215 seconds Thu Apr 23 10:24:15 2020 *Port Scan* detected from 164.90.73.21 (IN/India/-). 11 hits in the last 130 seconds |
2020-04-23 23:08:21 |
| 188.163.16.170 | attackbots | Unauthorized connection attempt from IP address 188.163.16.170 on Port 445(SMB) |
2020-04-23 22:39:07 |
| 116.234.1.46 | attackbotsspam | Unauthorized connection attempt from IP address 116.234.1.46 on Port 445(SMB) |
2020-04-23 22:53:24 |
| 80.28.211.131 | attackbotsspam | SSH brute-force: detected 6 distinct usernames within a 24-hour window. |
2020-04-23 23:04:08 |
| 134.122.20.113 | attackbots | Apr 23 12:45:38 scw-6657dc sshd[23327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.20.113 Apr 23 12:45:38 scw-6657dc sshd[23327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.20.113 Apr 23 12:45:39 scw-6657dc sshd[23327]: Failed password for invalid user ru from 134.122.20.113 port 37052 ssh2 ... |
2020-04-23 22:28:42 |