Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hanoi

Region: unknown

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.114.94.3 attackspambots
Unauthorized connection attempt detected from IP address 42.114.94.3 to port 23
2019-12-31 01:42:46
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '42.114.80.0 - 42.114.95.255'

% Abuse contact for '42.114.80.0 - 42.114.95.255' is 'hm-changed@vnnic.vn'

inetnum:        42.114.80.0 - 42.114.95.255
netname:        FPTDYNAMICIP-NET
country:        vn
descr:          FPT Telecom Company
descr:          2nd floor FPT Building, Pham Hung Road, Cau Giay District, Hanoi
admin-c:        LDP12-AP
tech-c:         NOC21-AP
status:         ALLOCATED NON-PORTABLE
remarks:        For spamming matters, mail to abuse@fpt.vn
mnt-by:         MAINT-VN-FPT
mnt-irt:        IRT-VNNIC-AP
last-modified:  2022-01-17T02:11:18Z
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         hm-changed@vnnic.vn
abuse-mailbox:  hm-changed@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2026-04-06T06:49:37Z
source:         APNIC

person:         Luong Duy Phuong
address:        FPT-VN
country:        VN
phone:          +84-28-73002222
e-mail:         phuongld@fpt.com
nic-hdl:        LDP12-AP
mnt-by:         MAINT-VN-FPT
last-modified:  2023-10-16T02:13:55Z
abuse-mailbox:  abuse@fpt.net
source:         APNIC

person:         Network Operation Center
nic-hdl:        NOC21-AP
e-mail:         ftel.noc.net@fpt.com
address:        FPT Telecom
phone:          +84-28-73093388
fax-no:         +84-28-73008889
country:        VN
mnt-by:         MAINT-VN-VNNIC
last-modified:  2023-10-16T01:44:54Z
source:         APNIC

% Information related to '42.114.94.0/24AS18403'

route:          42.114.94.0/24
origin:         AS18403
descr:          Vietnam Internet Network Information Center (VNNIC)
                18 Nguyen Du Str, Hai Ba Trung District, Hanoi City, Vietnam
                10th floor, MITEC Tower, Duong Dinh Nghe, Cau Giay, Hanoi
mnt-by:         MAINT-VN-FPT
last-modified:  2019-08-01T06:55:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.114.94.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11711
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.114.94.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 20:24:34 CST 2026
;; MSG SIZE  rcvd: 105
Host info
b'Host 57.94.114.42.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 42.114.94.57.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
159.65.91.218 attackbots
Feb 15 09:55:28 MK-Soft-VM8 sshd[28414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.91.218 
Feb 15 09:55:30 MK-Soft-VM8 sshd[28414]: Failed password for invalid user bhttest from 159.65.91.218 port 51740 ssh2
...
2020-02-15 18:17:34
13.66.192.66 attack
Feb 15 07:14:47 silence02 sshd[13349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.192.66
Feb 15 07:14:49 silence02 sshd[13349]: Failed password for invalid user passw0rd from 13.66.192.66 port 45232 ssh2
Feb 15 07:18:38 silence02 sshd[13565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.192.66
2020-02-15 18:20:04
175.182.135.230 attackbotsspam
Fail2Ban Ban Triggered
2020-02-15 17:48:36
92.63.194.105 attackspam
SSH bruteforce
2020-02-15 18:01:56
193.29.13.28 attackspam
20 attempts against mh-misbehave-ban on plane
2020-02-15 17:55:52
139.59.135.84 attackspam
Feb 15 06:03:49 firewall sshd[23317]: Invalid user caleb from 139.59.135.84
Feb 15 06:03:51 firewall sshd[23317]: Failed password for invalid user caleb from 139.59.135.84 port 41796 ssh2
Feb 15 06:06:48 firewall sshd[23441]: Invalid user sudor from 139.59.135.84
...
2020-02-15 18:10:34
74.215.95.54 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=16013)(02151159)
2020-02-15 17:56:53
78.36.231.66 attackbotsspam
unauthorized connection attempt
2020-02-15 18:09:04
122.155.223.59 attack
Invalid user pul from 122.155.223.59 port 41940
2020-02-15 18:09:34
1.20.205.149 attack
unauthorized connection attempt
2020-02-15 17:48:11
125.227.236.60 attackbotsspam
Feb 15 10:13:16 web8 sshd\[11123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.236.60  user=root
Feb 15 10:13:18 web8 sshd\[11123\]: Failed password for root from 125.227.236.60 port 40600 ssh2
Feb 15 10:17:06 web8 sshd\[13079\]: Invalid user direction from 125.227.236.60
Feb 15 10:17:06 web8 sshd\[13079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.236.60
Feb 15 10:17:07 web8 sshd\[13079\]: Failed password for invalid user direction from 125.227.236.60 port 60510 ssh2
2020-02-15 18:20:41
77.40.3.111 attackspam
Feb 15 06:32:33 web1 postfix/smtpd\[8697\]: warning: unknown\[77.40.3.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 15 06:33:52 web1 postfix/smtpd\[8697\]: warning: unknown\[77.40.3.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 15 06:33:59 web1 postfix/smtpd\[8697\]: warning: unknown\[77.40.3.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-15 17:51:44
111.249.76.35 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 17:49:59
111.248.83.120 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 18:21:25
111.249.69.46 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 17:54:04

Recently Reported IPs

2606:4700:10::6816:4284 2606:4700:10::6816:1223 218.70.115.164 171.253.242.253
10.101.104.98 58.216.59.67 118.70.182.219 2606:4700:10::6814:8179
2606:4700:10::6814:7887 2606:4700:10::ac43:691 2606:4700:10::6814:6881 2606:4700:10::6814:9134
2606:4700:10::6816:3036 2606:4700:10::6816:3259 2606:4700:10::6814:7045 66.151.137.161
66.132.224.92 2606:4700:10::ac43:1614 2606:4700:10::6814:8312 2606:4700:10::6816:865