Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.194.134.55 attackbotsspam
2020-10-12T12:45:57.952388morrigan.ad5gb.com sshd[678538]: Invalid user anthony from 42.194.134.55 port 53184
2020-10-13 02:22:19
42.194.134.55 attack
SSH/22 MH Probe, BF, Hack -
2020-10-12 17:47:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.194.134.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.194.134.243.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 20:04:19 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 243.134.194.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.134.194.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.48.116.84 attack
Oct 10 19:21:35 vps639187 sshd\[12381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.116.84  user=root
Oct 10 19:21:37 vps639187 sshd\[12381\]: Failed password for root from 103.48.116.84 port 58610 ssh2
Oct 10 19:23:57 vps639187 sshd\[12422\]: Invalid user tester from 103.48.116.84 port 40722
Oct 10 19:23:57 vps639187 sshd\[12422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.116.84
...
2020-10-11 01:53:47
112.85.42.30 attackbots
2020-10-10T17:59:25.606079shield sshd\[31093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.30  user=root
2020-10-10T17:59:27.590788shield sshd\[31093\]: Failed password for root from 112.85.42.30 port 31338 ssh2
2020-10-10T17:59:30.486853shield sshd\[31093\]: Failed password for root from 112.85.42.30 port 31338 ssh2
2020-10-10T17:59:32.476345shield sshd\[31093\]: Failed password for root from 112.85.42.30 port 31338 ssh2
2020-10-10T18:00:33.028998shield sshd\[31201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.30  user=root
2020-10-11 02:06:11
157.245.91.33 attackbots
157.245.91.33 - - [10/Oct/2020:18:33:24 +0100] "POST /wp-login.php HTTP/1.1" 200 2227 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.91.33 - - [10/Oct/2020:18:33:26 +0100] "POST /wp-login.php HTTP/1.1" 200 2157 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.91.33 - - [10/Oct/2020:18:33:26 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-11 01:42:19
45.235.93.14 attackspam
Invalid user tests from 45.235.93.14 port 30424
2020-10-11 01:49:06
73.72.31.114 attackspambots
Tried sshing with brute force.
2020-10-11 02:00:16
40.78.128.102 attackspambots
Invalid user postgres from 40.78.128.102 port 33064
2020-10-11 01:59:04
107.0.200.227 attackbots
2020-10-10T10:38:22.156134suse-nuc sshd[27632]: User root from 107.0.200.227 not allowed because not listed in AllowUsers
...
2020-10-11 01:53:33
129.211.124.120 attack
Automatic report - Banned IP Access
2020-10-11 01:38:41
213.141.131.22 attackspambots
2020-10-10T12:17:18.1988651495-001 sshd[14593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.141.131.22  user=root
2020-10-10T12:17:20.7207781495-001 sshd[14593]: Failed password for root from 213.141.131.22 port 42436 ssh2
2020-10-10T12:20:57.1401171495-001 sshd[14806]: Invalid user oracle from 213.141.131.22 port 45856
2020-10-10T12:20:57.1449651495-001 sshd[14806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.141.131.22
2020-10-10T12:20:57.1401171495-001 sshd[14806]: Invalid user oracle from 213.141.131.22 port 45856
2020-10-10T12:20:58.7288971495-001 sshd[14806]: Failed password for invalid user oracle from 213.141.131.22 port 45856 ssh2
...
2020-10-11 01:35:17
93.108.242.140 attackspam
(sshd) Failed SSH login from 93.108.242.140 (PT/Portugal/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 10 17:23:04 server2 sshd[6736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140  user=root
Oct 10 17:23:04 server2 sshd[6736]: Failed password for root from 93.108.242.140 port 45379 ssh2
Oct 10 17:29:59 server2 sshd[8009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140  user=root
Oct 10 17:30:00 server2 sshd[8009]: Failed password for root from 93.108.242.140 port 23013 ssh2
Oct 10 17:33:36 server2 sshd[8502]: Invalid user apache from 93.108.242.140 port 43069
2020-10-11 01:52:26
42.200.80.42 attackspambots
Oct 8 17:30:53 *hidden* sshd[29297]: Failed password for *hidden* from 42.200.80.42 port 42834 ssh2 Oct 8 17:37:17 *hidden* sshd[32164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.80.42 user=root Oct 8 17:37:19 *hidden* sshd[32164]: Failed password for *hidden* from 42.200.80.42 port 49668 ssh2
2020-10-11 01:56:29
201.242.124.100 attack
Icarus honeypot on github
2020-10-11 01:55:03
113.31.104.89 attack
(smtpauth) Failed SMTP AUTH login from 113.31.104.89 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-10-10 13:26:02 dovecot_login authenticator failed for (communicationsrelayllc.net) [113.31.104.89]:41036: 535 Incorrect authentication data (set_id=nologin)
2020-10-10 13:26:27 dovecot_login authenticator failed for (communicationsrelayllc.net) [113.31.104.89]:44602: 535 Incorrect authentication data (set_id=abuse@communicationsrelayllc.net)
2020-10-10 13:26:53 dovecot_login authenticator failed for (communicationsrelayllc.net) [113.31.104.89]:48584: 535 Incorrect authentication data (set_id=abuse)
2020-10-10 13:29:03 dovecot_login authenticator failed for (rosaritowebcam.net) [113.31.104.89]:40764: 535 Incorrect authentication data (set_id=nologin)
2020-10-10 13:29:28 dovecot_login authenticator failed for (rosaritowebcam.net) [113.31.104.89]:44472: 535 Incorrect authentication data (set_id=abuse@rosaritowebcam.net)
2020-10-11 01:35:54
49.233.139.218 attack
$f2bV_matches
2020-10-11 01:52:56
54.38.53.251 attackbots
Oct 10 18:21:54 ns382633 sshd\[8318\]: Invalid user art from 54.38.53.251 port 36530
Oct 10 18:21:54 ns382633 sshd\[8318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.53.251
Oct 10 18:21:56 ns382633 sshd\[8318\]: Failed password for invalid user art from 54.38.53.251 port 36530 ssh2
Oct 10 18:27:25 ns382633 sshd\[9471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.53.251  user=root
Oct 10 18:27:27 ns382633 sshd\[9471\]: Failed password for root from 54.38.53.251 port 58334 ssh2
2020-10-11 01:43:27

Recently Reported IPs

190.73.106.230 63.42.244.181 12.24.176.106 25.232.94.48
166.43.80.106 128.164.210.142 32.180.136.64 194.45.160.68
170.222.159.114 196.51.38.80 130.188.126.110 2.128.75.53
207.88.164.165 160.216.254.198 57.216.248.40 69.194.128.77
87.153.0.249 151.181.107.118 13.146.86.160 120.103.193.118