City: Hanoi
Region: unknown
Country: Vietnam
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 42.114.94.3 | attackspambots | Unauthorized connection attempt detected from IP address 42.114.94.3 to port 23 |
2019-12-31 01:42:46 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '42.114.80.0 - 42.114.95.255'
% Abuse contact for '42.114.80.0 - 42.114.95.255' is 'hm-changed@vnnic.vn'
inetnum: 42.114.80.0 - 42.114.95.255
netname: FPTDYNAMICIP-NET
country: vn
descr: FPT Telecom Company
descr: 2nd floor FPT Building, Pham Hung Road, Cau Giay District, Hanoi
admin-c: LDP12-AP
tech-c: NOC21-AP
status: ALLOCATED NON-PORTABLE
remarks: For spamming matters, mail to abuse@fpt.vn
mnt-by: MAINT-VN-FPT
mnt-irt: IRT-VNNIC-AP
last-modified: 2022-01-17T02:11:18Z
source: APNIC
irt: IRT-VNNIC-AP
address: Ha Noi, VietNam
phone: +84-24-35564944
fax-no: +84-24-37821462
e-mail: hm-changed@vnnic.vn
abuse-mailbox: hm-changed@vnnic.vn
admin-c: NTTT1-AP
tech-c: NTTT1-AP
auth: # Filtered
mnt-by: MAINT-VN-VNNIC
last-modified: 2026-04-06T06:49:37Z
source: APNIC
person: Luong Duy Phuong
address: FPT-VN
country: VN
phone: +84-28-73002222
e-mail: phuongld@fpt.com
nic-hdl: LDP12-AP
mnt-by: MAINT-VN-FPT
last-modified: 2023-10-16T02:13:55Z
abuse-mailbox: abuse@fpt.net
source: APNIC
person: Network Operation Center
nic-hdl: NOC21-AP
e-mail: ftel.noc.net@fpt.com
address: FPT Telecom
phone: +84-28-73093388
fax-no: +84-28-73008889
country: VN
mnt-by: MAINT-VN-VNNIC
last-modified: 2023-10-16T01:44:54Z
source: APNIC
% Information related to '42.114.94.0/24AS18403'
route: 42.114.94.0/24
origin: AS18403
descr: Vietnam Internet Network Information Center (VNNIC)
18 Nguyen Du Str, Hai Ba Trung District, Hanoi City, Vietnam
10th floor, MITEC Tower, Duong Dinh Nghe, Cau Giay, Hanoi
mnt-by: MAINT-VN-FPT
last-modified: 2019-08-01T06:55:03Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.114.94.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11711
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.114.94.57. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041100 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 20:24:34 CST 2026
;; MSG SIZE rcvd: 105
b'Host 57.94.114.42.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 42.114.94.57.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 159.65.91.218 | attackbots | Feb 15 09:55:28 MK-Soft-VM8 sshd[28414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.91.218 Feb 15 09:55:30 MK-Soft-VM8 sshd[28414]: Failed password for invalid user bhttest from 159.65.91.218 port 51740 ssh2 ... |
2020-02-15 18:17:34 |
| 13.66.192.66 | attack | Feb 15 07:14:47 silence02 sshd[13349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.192.66 Feb 15 07:14:49 silence02 sshd[13349]: Failed password for invalid user passw0rd from 13.66.192.66 port 45232 ssh2 Feb 15 07:18:38 silence02 sshd[13565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.192.66 |
2020-02-15 18:20:04 |
| 175.182.135.230 | attackbotsspam | Fail2Ban Ban Triggered |
2020-02-15 17:48:36 |
| 92.63.194.105 | attackspam | SSH bruteforce |
2020-02-15 18:01:56 |
| 193.29.13.28 | attackspam | 20 attempts against mh-misbehave-ban on plane |
2020-02-15 17:55:52 |
| 139.59.135.84 | attackspam | Feb 15 06:03:49 firewall sshd[23317]: Invalid user caleb from 139.59.135.84 Feb 15 06:03:51 firewall sshd[23317]: Failed password for invalid user caleb from 139.59.135.84 port 41796 ssh2 Feb 15 06:06:48 firewall sshd[23441]: Invalid user sudor from 139.59.135.84 ... |
2020-02-15 18:10:34 |
| 74.215.95.54 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=16013)(02151159) |
2020-02-15 17:56:53 |
| 78.36.231.66 | attackbotsspam | unauthorized connection attempt |
2020-02-15 18:09:04 |
| 122.155.223.59 | attack | Invalid user pul from 122.155.223.59 port 41940 |
2020-02-15 18:09:34 |
| 1.20.205.149 | attack | unauthorized connection attempt |
2020-02-15 17:48:11 |
| 125.227.236.60 | attackbotsspam | Feb 15 10:13:16 web8 sshd\[11123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.236.60 user=root Feb 15 10:13:18 web8 sshd\[11123\]: Failed password for root from 125.227.236.60 port 40600 ssh2 Feb 15 10:17:06 web8 sshd\[13079\]: Invalid user direction from 125.227.236.60 Feb 15 10:17:06 web8 sshd\[13079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.236.60 Feb 15 10:17:07 web8 sshd\[13079\]: Failed password for invalid user direction from 125.227.236.60 port 60510 ssh2 |
2020-02-15 18:20:41 |
| 77.40.3.111 | attackspam | Feb 15 06:32:33 web1 postfix/smtpd\[8697\]: warning: unknown\[77.40.3.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 15 06:33:52 web1 postfix/smtpd\[8697\]: warning: unknown\[77.40.3.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 15 06:33:59 web1 postfix/smtpd\[8697\]: warning: unknown\[77.40.3.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-02-15 17:51:44 |
| 111.249.76.35 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 17:49:59 |
| 111.248.83.120 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 18:21:25 |
| 111.249.69.46 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 17:54:04 |