Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.117.220.92 attackspambots
Unauthorised access (Aug  8) SRC=42.117.220.92 LEN=40 TOS=0x10 PREC=0x40 TTL=52 ID=41640 TCP DPT=23 WINDOW=64002 SYN
2020-08-09 00:38:48
42.117.227.246 attack
Tried our host z.
2020-07-05 14:55:07
42.117.22.118 attack
1588507687 - 05/03/2020 14:08:07 Host: 42.117.22.118/42.117.22.118 Port: 445 TCP Blocked
2020-05-04 01:57:39
42.117.229.59 attack
Unauthorized connection attempt detected from IP address 42.117.229.59 to port 23 [J]
2020-03-01 17:46:23
42.117.229.211 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 22:57:32
42.117.229.82 attack
Unauthorized connection attempt detected from IP address 42.117.229.82 to port 23 [T]
2020-01-22 08:19:53
42.117.227.12 attackspam
Unauthorized connection attempt detected from IP address 42.117.227.12 to port 23 [J]
2020-01-16 01:45:23
42.117.228.223 attack
Unauthorized connection attempt detected from IP address 42.117.228.223 to port 23 [T]
2020-01-09 02:23:26
42.117.228.16 attack
Unauthorized connection attempt detected from IP address 42.117.228.16 to port 23
2019-12-31 01:09:16
42.117.228.91 attack
Dec 14 00:56:09 mc1 kernel: \[440200.538444\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=42.117.228.91 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=10203 PROTO=TCP SPT=13701 DPT=23 WINDOW=10133 RES=0x00 SYN URGP=0 
Dec 14 00:56:09 mc1 kernel: \[440200.561695\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=42.117.228.91 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=10203 PROTO=TCP SPT=13701 DPT=23 WINDOW=10133 RES=0x00 SYN URGP=0 
Dec 14 00:56:09 mc1 kernel: \[440200.599860\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=42.117.228.91 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=10203 PROTO=TCP SPT=13701 DPT=23 WINDOW=10133 RES=0x00 SYN URGP=0 
...
2019-12-14 08:28:06
42.117.228.109 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-20 22:34:00
42.117.229.20 attackspam
Unauthorized connection attempt from IP address 42.117.229.20 on Port 445(SMB)
2019-11-02 17:36:11
42.117.228.5 attack
(Oct  5)  LEN=40 TTL=47 ID=35175 TCP DPT=8080 WINDOW=35358 SYN 
 (Oct  5)  LEN=40 TTL=46 ID=60673 TCP DPT=8080 WINDOW=17829 SYN 
 (Oct  4)  LEN=40 TTL=46 ID=36584 TCP DPT=8080 WINDOW=26003 SYN 
 (Oct  4)  LEN=40 TTL=47 ID=7481 TCP DPT=8080 WINDOW=35358 SYN 
 (Oct  4)  LEN=40 TTL=46 ID=56957 TCP DPT=8080 WINDOW=26003 SYN 
 (Oct  3)  LEN=40 TTL=46 ID=43044 TCP DPT=8080 WINDOW=17829 SYN 
 (Oct  3)  LEN=40 TTL=46 ID=49026 TCP DPT=8080 WINDOW=17829 SYN 
 (Oct  3)  LEN=40 TTL=46 ID=3598 TCP DPT=8080 WINDOW=26003 SYN 
 (Oct  2)  LEN=40 TTL=46 ID=21057 TCP DPT=8080 WINDOW=26003 SYN 
 (Oct  2)  LEN=40 TTL=46 ID=6321 TCP DPT=8080 WINDOW=26003 SYN 
 (Oct  2)  LEN=40 TTL=47 ID=4849 TCP DPT=8080 WINDOW=35358 SYN 
 (Oct  2)  LEN=40 TTL=46 ID=6959 TCP DPT=8080 WINDOW=17829 SYN 
 (Oct  2)  LEN=40 TTL=46 ID=59640 TCP DPT=8080 WINDOW=26003 SYN 
 (Oct  1)  LEN=40 TTL=47 ID=52655 TCP DPT=8080 WINDOW=35358 SYN 
 (Oct  1)  LEN=40 TTL=47 ID=15654 TCP DPT=8080 WINDOW=35358 SYN 
 (Oct  1)  LEN=40 TTL=46 ID=40...
2019-10-05 19:18:06
42.117.226.51 attackspambots
Unauthorized connection attempt from IP address 42.117.226.51 on Port 445(SMB)
2019-09-27 19:57:52
42.117.229.209 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-08 22:39:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.117.22.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.117.22.6.			IN	A

;; AUTHORITY SECTION:
.			419	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:42:56 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 6.22.117.42.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 6.22.117.42.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
142.44.142.136 attack
Brute forcing Wordpress login
2019-08-13 12:41:03
176.99.9.19 attackbotsspam
Brute forcing Wordpress login
2019-08-13 12:35:34
104.248.90.111 attackspam
Brute forcing Wordpress login
2019-08-13 12:48:00
59.10.82.135 attack
Brute forcing Wordpress login
2019-08-13 12:58:54
103.86.177.217 attack
Brute forcing Wordpress login
2019-08-13 12:48:29
119.29.37.47 attack
Brute forcing Wordpress login
2019-08-13 12:44:34
91.204.116.164 attack
Brute forcing Wordpress login
2019-08-13 12:51:29
204.48.25.217 attackspambots
Brute forcing Wordpress login
2019-08-13 12:26:21
185.66.141.119 attackspambots
Brute forcing Wordpress login
2019-08-13 12:31:29
81.169.215.70 attackbotsspam
Brute forcing Wordpress login
2019-08-13 12:53:13
192.157.221.19 attack
Brute forcing Wordpress login
2019-08-13 12:28:39
158.69.37.5 attack
Brute forcing Wordpress login
2019-08-13 12:37:53
202.80.240.38 attackspambots
Brute forcing Wordpress login
2019-08-13 12:26:47
185.53.131.94 attack
Brute forcing Wordpress login
2019-08-13 12:31:59
62.210.105.74 attackspam
Brute forcing Wordpress login
2019-08-13 12:57:41

Recently Reported IPs

42.118.228.245 42.118.95.100 42.118.23.96 42.118.39.158
42.118.95.180 42.118.42.23 42.122.65.201 42.119.82.62
42.119.157.63 42.119.25.201 42.122.17.185 42.127.192.30
42.119.224.186 42.151.105.181 42.145.221.229 42.176.117.116
42.176.113.230 42.176.45.130 42.177.152.230 42.179.64.13