Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Central

Region: Central and Western District

Country: Hong Kong

Internet Service Provider: Hong Kong Telecommunications (HKT) Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt detected from IP address 42.2.8.164 to port 5555 [J]
2020-01-05 03:38:50
Comments on same subnet:
IP Type Details Datetime
42.2.88.210 attack
Invalid user pi from 42.2.88.210 port 44932
2020-09-11 21:47:27
42.2.88.210 attack
Invalid user pi from 42.2.88.210 port 44932
2020-09-11 13:55:14
42.2.88.210 attackbotsspam
Lines containing failures of 42.2.88.210
Sep 10 19:48:34 shared10 sshd[26616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.2.88.210  user=r.r
Sep 10 19:48:36 shared10 sshd[26616]: Failed password for r.r from 42.2.88.210 port 53383 ssh2
Sep 10 19:48:36 shared10 sshd[26616]: Connection closed by authenticating user r.r 42.2.88.210 port 53383 [preauth]
Sep 10 19:48:39 shared10 sshd[26719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.2.88.210  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=42.2.88.210
2020-09-11 06:07:36
42.2.88.146 attackspambots
Honeypot attack, port: 5555, PTR: 42-2-88-146.static.netvigator.com.
2020-04-01 01:54:14
42.2.88.146 attackspam
Attempted connection to port 5555.
2020-03-30 20:50:59
42.2.80.196 attackbotsspam
Port probing on unauthorized port 5555
2020-03-29 13:58:04
42.2.88.130 attack
Honeypot attack, port: 5555, PTR: 42-2-88-130.static.netvigator.com.
2020-02-20 20:00:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.8.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7861
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.2.8.164.			IN	A

;; AUTHORITY SECTION:
.			154	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010400 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 05 03:38:47 CST 2020
;; MSG SIZE  rcvd: 114
Host info
164.8.2.42.in-addr.arpa domain name pointer 42-2-8-164.static.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.8.2.42.in-addr.arpa	name = 42-2-8-164.static.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.255.187.200 attackspambots
firewall-block, port(s): 1433/tcp
2020-01-06 01:07:52
150.109.231.90 attack
Unauthorized connection attempt detected from IP address 150.109.231.90 to port 8123 [J]
2020-01-06 00:52:36
66.42.28.250 attackspam
Unauthorized connection attempt detected from IP address 66.42.28.250 to port 23
2020-01-06 01:04:18
83.103.215.60 attackspam
Unauthorized connection attempt detected from IP address 83.103.215.60 to port 8000
2020-01-06 00:59:23
167.71.200.175 attackspam
Unauthorized connection attempt detected from IP address 167.71.200.175 to port 8545 [J]
2020-01-06 00:51:46
211.230.94.226 attackspam
Unauthorized connection attempt detected from IP address 211.230.94.226 to port 4567 [J]
2020-01-06 01:12:45
41.33.129.164 attackspam
Unauthorized connection attempt detected from IP address 41.33.129.164 to port 445
2020-01-06 00:36:08
187.178.144.16 attackspam
Unauthorized connection attempt detected from IP address 187.178.144.16 to port 23
2020-01-06 00:46:52
181.113.65.164 attackspam
Unauthorized connection attempt detected from IP address 181.113.65.164 to port 445
2020-01-06 00:49:52
14.55.124.138 attack
Unauthorized connection attempt detected from IP address 14.55.124.138 to port 4567 [J]
2020-01-06 01:09:04
46.25.31.59 attack
Unauthorized connection attempt detected from IP address 46.25.31.59 to port 23 [J]
2020-01-06 01:07:05
59.19.224.145 attack
Unauthorized connection attempt detected from IP address 59.19.224.145 to port 23
2020-01-06 00:33:35
49.235.7.47 attack
Unauthorized connection attempt detected from IP address 49.235.7.47 to port 2220 [J]
2020-01-06 00:34:43
197.51.119.30 attackspam
Unauthorized connection attempt detected from IP address 197.51.119.30 to port 22
2020-01-06 01:15:06
222.103.136.63 attackspam
Unauthorized connection attempt detected from IP address 222.103.136.63 to port 5555 [J]
2020-01-06 00:39:37

Recently Reported IPs

182.36.33.248 210.216.223.96 210.201.118.103 82.37.129.143
36.12.96.23 180.167.235.57 106.138.237.95 217.213.29.198
161.180.40.181 214.147.161.151 23.216.103.15 71.115.107.143
104.83.215.155 190.239.178.226 109.185.38.40 195.199.67.89
147.157.207.29 45.162.130.18 50.159.115.24 137.175.190.224