Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: FPT Telecom Company

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
*Port Scan* detected from 42.119.14.59 (VN/Vietnam/-). 4 hits in the last 250 seconds
2019-08-30 08:16:13
Comments on same subnet:
IP Type Details Datetime
42.119.149.55 attackbots
Attempted connection to port 445.
2020-08-01 16:46:42
42.119.145.98 attackspam
1594179775 - 07/08/2020 05:42:55 Host: 42.119.145.98/42.119.145.98 Port: 445 TCP Blocked
2020-07-08 16:55:18
42.119.149.26 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 15-04-2020 04:55:10.
2020-04-15 15:24:36
42.119.14.203 attackbots
Automatic report - Port Scan Attack
2020-03-14 05:19:10
42.119.149.103 attackbots
Email rejected due to spam filtering
2020-03-10 16:45:45
42.119.14.199 attackspam
Unauthorized connection attempt detected from IP address 42.119.14.199 to port 23 [T]
2020-01-20 07:00:51
42.119.14.140 attackspam
Dec  2 16:36:07 server sshd\[10903\]: Invalid user pi from 42.119.14.140
Dec  2 16:36:07 server sshd\[10904\]: Invalid user pi from 42.119.14.140
Dec  2 16:36:07 server sshd\[10903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.14.140 
Dec  2 16:36:07 server sshd\[10904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.14.140 
Dec  2 16:36:09 server sshd\[10903\]: Failed password for invalid user pi from 42.119.14.140 port 43956 ssh2
...
2019-12-02 23:00:28
42.119.145.40 attackspambots
Sun, 21 Jul 2019 07:36:07 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 22:50:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.119.14.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34236
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.119.14.59.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082901 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 30 08:16:07 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 59.14.119.42.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 59.14.119.42.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
74.94.152.59 attackbotsspam
Unauthorized connection attempt detected from IP address 74.94.152.59 to port 443
2020-05-29 23:32:51
150.109.239.89 attackbots
Unauthorized connection attempt detected from IP address 150.109.239.89 to port 1720
2020-05-29 23:17:16
213.142.156.35 spam
Huge amount of SPAM E-Mail received from this IP Address
2020-05-29 23:17:39
82.33.20.68 attack
May 29 14:20:14 nas sshd[12122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.33.20.68 
May 29 14:20:15 nas sshd[12124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.33.20.68 
May 29 14:20:17 nas sshd[12122]: Failed password for invalid user pi from 82.33.20.68 port 33252 ssh2
...
2020-05-29 23:29:29
77.42.109.148 attackbotsspam
Port Scan
2020-05-29 23:31:12
61.84.247.221 attack
Unauthorized connection attempt detected from IP address 61.84.247.221 to port 5555
2020-05-29 23:36:12
189.69.134.121 attack
Unauthorized connection attempt detected from IP address 189.69.134.121 to port 23
2020-05-29 23:50:28
128.199.72.250 attack
Port Scan
2020-05-29 23:18:09
27.115.124.74 attack
scans 2 times in preceeding hours on the ports (in chronological order) 5061 5432
2020-05-29 23:42:15
61.152.90.81 attackspambots
Unauthorized connection attempt detected from IP address 61.152.90.81 to port 6550
2020-05-29 23:35:48
178.93.32.18 attackspam
Unauthorized connection attempt detected from IP address 178.93.32.18 to port 80
2020-05-29 23:13:40
171.225.250.128 attackspambots
Unauthorized connection attempt detected from IP address 171.225.250.128 to port 445
2020-05-29 23:15:36
196.218.238.198 attackspambots
Port Scan
2020-05-29 23:46:58
37.202.73.193 attack
Port Scan
2020-05-29 23:41:20
69.84.98.202 attackbotsspam
Unauthorized connection attempt detected from IP address 69.84.98.202 to port 23
2020-05-29 23:33:42

Recently Reported IPs

187.87.12.232 104.223.185.19 119.166.210.2 73.255.48.212
187.108.236.173 93.0.75.34 27.220.74.245 35.198.170.210
78.186.46.58 45.165.48.2 78.188.110.144 113.186.126.20
200.138.50.139 181.28.94.205 77.71.62.220 173.113.88.131
106.227.142.113 124.155.1.98 220.210.106.114 157.109.118.147