Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hanoi

Region: Hanoi

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.119.139.190 attack
Unauthorized connection attempt detected from IP address 42.119.139.190 to port 23 [J]
2020-01-17 06:46:13
42.119.139.190 attackbots
Telnetd brute force attack detected by fail2ban
2020-01-16 01:08:06
42.119.139.226 attack
Unauthorized connection attempt detected from IP address 42.119.139.226 to port 23 [T]
2020-01-09 02:47:00
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.119.139.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.119.139.116.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050103 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 12:46:19 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 116.139.119.42.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 116.139.119.42.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
68.48.172.86 attackbotsspam
Brute force attempt
2019-07-11 10:14:57
209.200.5.4 attack
Unauthorised access (Jul 10) SRC=209.200.5.4 LEN=40 TTL=241 ID=32479 TCP DPT=445 WINDOW=1024 SYN
2019-07-11 10:27:30
148.70.3.199 attackbotsspam
Jul 10 23:08:03 icinga sshd[14591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.3.199
Jul 10 23:08:05 icinga sshd[14591]: Failed password for invalid user courtney from 148.70.3.199 port 39056 ssh2
...
2019-07-11 10:57:06
119.29.85.83 attack
Multiple failed RDP login attempts
2019-07-11 11:02:25
79.143.187.223 attackspam
Invalid user ubuntu from 79.143.187.223 port 55800
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.187.223
Failed password for invalid user ubuntu from 79.143.187.223 port 55800 ssh2
Invalid user cmsadmin from 79.143.187.223 port 50450
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.187.223
2019-07-11 10:36:38
187.188.231.90 attackspambots
Unauthorized connection attempt from IP address 187.188.231.90 on Port 445(SMB)
2019-07-11 11:02:47
206.189.108.59 attack
Jul 10 21:00:38 icinga sshd[2299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.108.59
Jul 10 21:00:40 icinga sshd[2299]: Failed password for invalid user admin from 206.189.108.59 port 42804 ssh2
...
2019-07-11 10:41:06
122.114.236.178 attackspam
ssh failed login
2019-07-11 10:49:27
59.23.190.100 attackbotsspam
Jul 10 22:57:04 MK-Soft-Root1 sshd\[13526\]: Invalid user abe from 59.23.190.100 port 46619
Jul 10 22:57:04 MK-Soft-Root1 sshd\[13526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.23.190.100
Jul 10 22:57:06 MK-Soft-Root1 sshd\[13526\]: Failed password for invalid user abe from 59.23.190.100 port 46619 ssh2
...
2019-07-11 10:08:11
118.163.181.157 attackspambots
Jul 11 07:42:04 itv-usvr-02 sshd[8913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.181.157  user=root
Jul 11 07:42:06 itv-usvr-02 sshd[8913]: Failed password for root from 118.163.181.157 port 51822 ssh2
Jul 11 07:44:30 itv-usvr-02 sshd[8921]: Invalid user alexandra from 118.163.181.157 port 47146
Jul 11 07:44:30 itv-usvr-02 sshd[8921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.181.157
Jul 11 07:44:30 itv-usvr-02 sshd[8921]: Invalid user alexandra from 118.163.181.157 port 47146
Jul 11 07:44:32 itv-usvr-02 sshd[8921]: Failed password for invalid user alexandra from 118.163.181.157 port 47146 ssh2
2019-07-11 10:16:58
197.51.129.156 attackspambots
Unauthorized connection attempt from IP address 197.51.129.156 on Port 445(SMB)
2019-07-11 10:16:03
197.227.101.253 attack
Jul 10 21:00:33 vps65 sshd\[13048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.101.253
Jul 10 21:00:33 vps65 sshd\[13050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.101.253
...
2019-07-11 10:53:30
46.101.139.105 attackbots
Jul 10 22:05:34 localhost sshd\[31780\]: Invalid user owner from 46.101.139.105 port 50282
Jul 10 22:05:34 localhost sshd\[31780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.139.105
Jul 10 22:05:36 localhost sshd\[31780\]: Failed password for invalid user owner from 46.101.139.105 port 50282 ssh2
2019-07-11 10:39:10
185.244.234.45 attackbotsspam
Excessive Port-Scanning
2019-07-11 10:30:01
186.185.73.250 attack
Unauthorized connection attempt from IP address 186.185.73.250 on Port 445(SMB)
2019-07-11 10:27:52

Recently Reported IPs

70.141.208.127 94.118.4.242 109.25.225.39 76.198.85.168
60.162.33.241 46.146.15.34 144.84.133.201 95.75.215.146
138.50.43.162 94.17.99.75 61.6.97.104 163.18.112.192
57.196.155.230 171.154.241.11 70.70.23.16 39.97.112.86
132.246.251.177 77.59.239.203 205.223.120.149 35.39.89.161