Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
spambotsattackproxynormal
All devices are hacked with jsquery with this ip network address. All devices hacked for 2 years, can’t get rid of this problem due to having an allocation tag.
2025-02-14 03:55:10
attack
All devices are hacked with jsquery with this ip network address. All devices hacked for 2 years, can’t get rid of this problem due to having an allocation tag.
2025-02-14 03:55:00
attack
All devices are hacked with jsquery with this ip network address. All devices hacked for 2 years, can’t get rid of this problem due to having an allocation tag.
2025-02-14 03:54:53
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.134.142.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.134.142.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:21:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 214.142.134.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.142.134.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.255.49.92 attackbots
CyberHackers.eu > SSH Bruteforce attempt!
2019-11-17 03:23:04
180.175.119.179 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-17 03:26:54
188.131.138.230 attackbotsspam
Nov 16 20:08:34 zulu412 sshd\[10100\]: Invalid user bernadette from 188.131.138.230 port 40748
Nov 16 20:08:34 zulu412 sshd\[10100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.138.230
Nov 16 20:08:36 zulu412 sshd\[10100\]: Failed password for invalid user bernadette from 188.131.138.230 port 40748 ssh2
...
2019-11-17 03:27:56
94.19.209.109 attack
Brute force SMTP login attempted.
...
2019-11-17 03:22:52
172.81.214.129 attackspam
Nov 17 00:51:43 areeb-Workstation sshd[1144]: Failed password for root from 172.81.214.129 port 33635 ssh2
...
2019-11-17 03:47:26
49.235.104.204 attack
Nov 16 08:32:11 auw2 sshd\[26335\]: Invalid user oonishi from 49.235.104.204
Nov 16 08:32:11 auw2 sshd\[26335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.104.204
Nov 16 08:32:13 auw2 sshd\[26335\]: Failed password for invalid user oonishi from 49.235.104.204 port 52520 ssh2
Nov 16 08:36:31 auw2 sshd\[26666\]: Invalid user zang from 49.235.104.204
Nov 16 08:36:31 auw2 sshd\[26666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.104.204
2019-11-17 03:36:23
103.59.104.33 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-17 03:43:25
46.59.160.123 attackspambots
Chat Spam
2019-11-17 03:32:25
14.56.180.103 attack
Nov 16 14:02:39 firewall sshd[25152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.56.180.103
Nov 16 14:02:39 firewall sshd[25152]: Invalid user guisto from 14.56.180.103
Nov 16 14:02:41 firewall sshd[25152]: Failed password for invalid user guisto from 14.56.180.103 port 60234 ssh2
...
2019-11-17 03:25:01
222.186.173.180 attackbotsspam
Nov 16 20:27:45 ns381471 sshd[25711]: Failed password for root from 222.186.173.180 port 24540 ssh2
Nov 16 20:27:57 ns381471 sshd[25711]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 24540 ssh2 [preauth]
2019-11-17 03:35:41
80.82.64.127 attack
11/16/2019-20:44:56.121137 80.82.64.127 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2019-11-17 03:46:41
151.80.254.74 attack
2019-11-16T19:22:50.703442abusebot-6.cloudsearch.cf sshd\[11609\]: Invalid user claudette from 151.80.254.74 port 39330
2019-11-17 03:33:56
106.12.77.199 attackspam
2019-11-16T17:33:40.318461shield sshd\[18585\]: Invalid user horror from 106.12.77.199 port 50690
2019-11-16T17:33:40.323455shield sshd\[18585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.199
2019-11-16T17:33:42.404612shield sshd\[18585\]: Failed password for invalid user horror from 106.12.77.199 port 50690 ssh2
2019-11-16T17:38:03.599702shield sshd\[19540\]: Invalid user password from 106.12.77.199 port 56316
2019-11-16T17:38:03.604500shield sshd\[19540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.199
2019-11-17 03:30:30
165.227.80.114 attack
$f2bV_matches
2019-11-17 03:44:32
218.91.88.44 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/218.91.88.44/ 
 
 CN - 1H : (652)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 218.91.88.44 
 
 CIDR : 218.91.0.0/17 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 11 
  3H - 26 
  6H - 61 
 12H - 141 
 24H - 281 
 
 DateTime : 2019-11-16 15:48:14 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-17 03:39:17

Recently Reported IPs

90.173.181.152 50.98.78.250 141.58.171.190 236.254.227.74
71.75.117.47 203.163.165.47 7.191.0.39 125.242.122.96
157.160.55.101 74.233.5.217 55.113.120.103 213.24.191.33
85.177.220.234 128.208.117.141 255.64.238.89 129.250.132.35
246.70.74.228 28.176.188.212 33.14.26.202 88.69.243.235