Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: Hong Kong Telecommunications (HKT) Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Unauthorized connection attempt detected from IP address 42.2.71.199 to port 5555 [J]
2020-01-27 00:53:51
Comments on same subnet:
IP Type Details Datetime
42.2.71.83 attack
Honeypot attack, port: 5555, PTR: 42-2-71-083.static.netvigator.com.
2020-05-07 12:45:34
42.2.71.94 attackbotsspam
Connection by 42.2.71.94 on port: 23 got caught by honeypot at 11/24/2019 5:24:41 AM
2019-11-24 18:05:09
42.2.71.102 attackbots
port scan and connect, tcp 23 (telnet)
2019-11-18 23:20:53
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.71.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.2.71.199.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012600 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 00:53:47 CST 2020
;; MSG SIZE  rcvd: 115
Host info
199.71.2.42.in-addr.arpa domain name pointer 42-2-71-199.static.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.71.2.42.in-addr.arpa	name = 42-2-71-199.static.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
102.166.1.152 attackbots
445/tcp 445/tcp
[2020-06-22]2pkt
2020-06-23 07:04:21
186.33.134.164 attackspambots
xmlrpc attack
2020-06-23 07:08:06
23.100.17.127 attack
Port scan: Attack repeated for 24 hours
2020-06-23 06:53:17
37.148.93.12 attackbots
Automatic report - Port Scan Attack
2020-06-23 06:44:16
185.176.27.250 attack
06/22/2020-17:43:59.849105 185.176.27.250 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-06-23 07:03:29
140.143.239.86 attackbotsspam
Invalid user ark from 140.143.239.86 port 48638
2020-06-23 06:45:53
213.180.203.186 attackspam
[Tue Jun 23 03:35:32.943423 2020] [:error] [pid 29947:tid 140048062207744] [client 213.180.203.186:47714] [client 213.180.203.186] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XvEWFIDYjTfSl8eTMk6qhQAAAfE"]
...
2020-06-23 06:53:45
107.179.13.141 attackspambots
27452/tcp
[2020-06-22]1pkt
2020-06-23 07:13:18
83.4.144.52 attack
23/tcp
[2020-06-22]1pkt
2020-06-23 06:42:26
163.172.154.178 attack
Jun 23 01:40:13 lukav-desktop sshd\[13534\]: Invalid user yamazaki from 163.172.154.178
Jun 23 01:40:13 lukav-desktop sshd\[13534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.154.178
Jun 23 01:40:15 lukav-desktop sshd\[13534\]: Failed password for invalid user yamazaki from 163.172.154.178 port 54406 ssh2
Jun 23 01:43:03 lukav-desktop sshd\[13572\]: Invalid user testuser from 163.172.154.178
Jun 23 01:43:03 lukav-desktop sshd\[13572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.154.178
2020-06-23 06:58:55
148.101.223.117 attackbots
445/tcp 445/tcp
[2020-06-22]2pkt
2020-06-23 07:12:29
180.70.138.57 attackbots
54068/udp 54068/udp 54068/udp...
[2020-06-22]6pkt,1pt.(udp)
2020-06-23 07:06:33
163.172.9.85 attackbotsspam
 UDP 163.172.9.85:5651 -> port 5060, len 430
2020-06-23 06:47:20
207.154.234.102 attackbots
959. On Jun 22 2020 experienced a Brute Force SSH login attempt -> 5 unique times by 207.154.234.102.
2020-06-23 06:51:24
80.82.155.26 attackspambots
Brute force attempt
2020-06-23 06:47:50

Recently Reported IPs

140.51.167.59 149.118.11.250 50.169.171.198 36.32.3.189
139.187.165.17 205.20.71.200 29.163.201.249 155.121.113.9
233.20.153.75 36.32.3.118 174.121.225.108 115.126.34.24
139.234.29.58 2.133.81.180 71.73.156.146 1.52.131.220
134.109.88.35 10.238.166.134 244.28.146.52 8.185.115.194