Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Venezuela, Bolivarian Republic of

Internet Service Provider: CANTV Servicios Venezuela

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
Unauthorized connection attempt from IP address 201.242.53.122 on Port 445(SMB)
2019-06-26 06:37:10
Comments on same subnet:
IP Type Details Datetime
201.242.53.213 attackspam
SMB 445 TCP - get your free FULL list of bad IP's @ plonkatronix.com
2020-02-25 05:42:18
201.242.53.213 attackspam
Unauthorized connection attempt from IP address 201.242.53.213 on Port 445(SMB)
2020-01-16 18:05:48
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.242.53.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13644
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.242.53.122.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062502 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 26 06:37:04 CST 2019
;; MSG SIZE  rcvd: 118
Host info
122.53.242.201.in-addr.arpa domain name pointer 201-242-53-122.genericrev.cantv.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
122.53.242.201.in-addr.arpa	name = 201-242-53-122.genericrev.cantv.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.31.166 attackbots
Apr 17 17:48:17 plusreed sshd[3235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Apr 17 17:48:20 plusreed sshd[3235]: Failed password for root from 222.186.31.166 port 25599 ssh2
...
2020-04-18 05:50:02
186.101.233.134 attackbots
Apr 17 22:54:30 server sshd[10883]: Failed password for root from 186.101.233.134 port 46714 ssh2
Apr 17 23:07:15 server sshd[13024]: Failed password for invalid user ki from 186.101.233.134 port 39376 ssh2
Apr 17 23:11:18 server sshd[13814]: Failed password for root from 186.101.233.134 port 46754 ssh2
2020-04-18 05:44:10
112.85.42.173 attackspambots
$f2bV_matches
2020-04-18 05:24:18
196.52.43.122 attackspam
" "
2020-04-18 05:36:43
192.241.238.164 attackspam
Port Scan: Events[1] countPorts[1]: 9200 ..
2020-04-18 05:50:31
179.238.204.184 attackspam
Apr 17 20:53:15 h1946882 sshd[1063]: pam_unix(sshd:auth): authenticatio=
n failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D179-2=
38-204-184.user.veloxzone.com.br=20
Apr 17 20:53:17 h1946882 sshd[1063]: Failed password for invalid user a=
dmin from 179.238.204.184 port 59917 ssh2
Apr 17 20:53:56 h1946882 sshd[1063]: Received disconnect from 179.238.2=
04.184: 11: Bye Bye [preauth]
Apr 17 21:01:28 h1946882 sshd[1136]: pam_unix(sshd:auth): authenticatio=
n failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D179-2=
38-204-184.user.veloxzone.com.br=20


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.238.204.184
2020-04-18 05:51:21
209.17.96.210 attack
Port Scan: Events[9] countPorts[8]: 8443 8888 8081 8080 3000 4567 443 9000 ..
2020-04-18 05:32:06
170.130.187.34 attackspam
ET SCAN Suspicious inbound to PostgreSQL port 5432 - port: 5432 proto: TCP cat: Potentially Bad Traffic
2020-04-18 05:24:53
68.183.137.173 attack
web-1 [ssh] SSH Attack
2020-04-18 05:33:41
81.28.100.155 attackbots
Apr 17 21:21:14  exim[25521]: [1\47] 1jPWY5-0006dd-Gn H=(command.atalizinq.com) [81.28.100.155] F= rejected after DATA: This message scored 104.4 spam points.
2020-04-18 05:51:42
106.12.140.168 attackbotsspam
Port Scan: Events[1] countPorts[1]: 1145 ..
2020-04-18 05:33:17
103.108.87.133 attackbotsspam
SSH Brute Force
2020-04-18 05:14:59
92.118.160.57 attackbotsspam
Port Scan: Events[1] countPorts[1]: 5443 ..
2020-04-18 05:47:10
36.110.41.66 attackbots
Port Scan: Events[1] countPorts[1]: 22 ..
2020-04-18 05:38:41
104.192.6.17 attackbots
SSH Invalid Login
2020-04-18 05:46:44

Recently Reported IPs

197.50.232.198 195.225.231.221 81.130.128.34 192.200.108.162
121.194.88.46 106.228.233.53 189.199.112.116 125.230.161.249
190.120.198.36 111.119.206.45 182.232.157.192 201.18.147.186
170.239.41.23 84.90.101.54 190.171.118.237 199.204.248.139
137.87.185.99 131.100.76.38 85.244.172.77 191.53.233.243