Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT. Matrixnet Global Indonesia

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Honeypot attack, port: 445, PTR: 66.subnet-213.matrixglobal.net.id.
2020-04-16 02:32:13
Comments on same subnet:
IP Type Details Datetime
43.248.213.74 attackspam
Unauthorized connection attempt from IP address 43.248.213.74 on Port 445(SMB)
2020-03-07 00:17:46
43.248.213.102 attackspambots
Oct  2 08:48:00 our-server-hostname postfix/smtpd[26034]: connect from unknown[43.248.213.102]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=43.248.213.102
2019-10-03 17:10:47
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.248.213.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41765
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;43.248.213.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 28 06:58:41 CST 2019
;; MSG SIZE  rcvd: 117

Host info
66.213.248.43.in-addr.arpa domain name pointer 66.subnet-213.matrixglobal.net.id.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
66.213.248.43.in-addr.arpa	name = 66.subnet-213.matrixglobal.net.id.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
205.209.159.201 attackbots
Aug  1 06:31:00 debian-2gb-nbg1-2 kernel: \[18514742.717614\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=205.209.159.201 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=237 ID=10329 PROTO=TCP SPT=36245 DPT=9000 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-01 12:45:39
180.76.168.54 attack
Aug  1 05:55:06 vpn01 sshd[32185]: Failed password for root from 180.76.168.54 port 53480 ssh2
...
2020-08-01 12:25:35
152.136.112.251 attackspam
$f2bV_matches
2020-08-01 12:28:29
159.89.170.154 attackspam
(sshd) Failed SSH login from 159.89.170.154 (IN/India/-): 5 in the last 3600 secs
2020-08-01 12:29:49
62.234.82.70 attackspambots
Aug  1 03:58:03 *** sshd[4115]: User root from 62.234.82.70 not allowed because not listed in AllowUsers
2020-08-01 12:18:58
84.22.49.174 attackbots
Aug  1 06:10:29 eventyay sshd[3205]: Failed password for root from 84.22.49.174 port 49910 ssh2
Aug  1 06:14:48 eventyay sshd[3301]: Failed password for root from 84.22.49.174 port 35388 ssh2
...
2020-08-01 12:32:56
182.122.16.75 attack
Aug  1 05:53:35 sip sshd[1152076]: Failed password for root from 182.122.16.75 port 27246 ssh2
Aug  1 05:58:15 sip sshd[1152130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.16.75  user=root
Aug  1 05:58:16 sip sshd[1152130]: Failed password for root from 182.122.16.75 port 28680 ssh2
...
2020-08-01 12:15:49
222.186.42.57 attackbots
Aug  1 04:10:01 rush sshd[29609]: Failed password for root from 222.186.42.57 port 53994 ssh2
Aug  1 04:10:11 rush sshd[29616]: Failed password for root from 222.186.42.57 port 16808 ssh2
Aug  1 04:10:14 rush sshd[29616]: Failed password for root from 222.186.42.57 port 16808 ssh2
...
2020-08-01 12:18:09
106.54.87.169 attackspam
Aug  1 00:51:55 vps46666688 sshd[9350]: Failed password for root from 106.54.87.169 port 52160 ssh2
...
2020-08-01 12:26:48
178.32.49.166 attackspambots
Port scan on 1 port(s): 445
2020-08-01 12:11:03
45.129.33.9 attackbotsspam
Aug  1 06:41:35 debian-2gb-nbg1-2 kernel: \[18515377.710137\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.129.33.9 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=48386 PROTO=TCP SPT=49632 DPT=11112 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-01 12:44:20
51.79.44.52 attack
Aug  1 05:54:02 home sshd[657605]: Failed password for root from 51.79.44.52 port 42472 ssh2
Aug  1 05:56:05 home sshd[658277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.44.52  user=root
Aug  1 05:56:07 home sshd[658277]: Failed password for root from 51.79.44.52 port 48882 ssh2
Aug  1 05:58:16 home sshd[659013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.44.52  user=root
Aug  1 05:58:19 home sshd[659013]: Failed password for root from 51.79.44.52 port 55290 ssh2
...
2020-08-01 12:14:43
51.254.32.102 attackbotsspam
Aug  1 05:54:31 [host] sshd[23446]: pam_unix(sshd:
Aug  1 05:54:33 [host] sshd[23446]: Failed passwor
Aug  1 05:58:27 [host] sshd[23557]: pam_unix(sshd:
2020-08-01 12:09:12
118.27.11.168 attackspam
Aug  1 05:50:01 piServer sshd[22416]: Failed password for root from 118.27.11.168 port 60356 ssh2
Aug  1 05:54:14 piServer sshd[22692]: Failed password for root from 118.27.11.168 port 44466 ssh2
...
2020-08-01 12:07:58
124.82.222.209 attack
Aug  1 05:57:43 mout sshd[26226]: Connection closed by 124.82.222.209 port 53759 [preauth]
2020-08-01 12:37:45

Recently Reported IPs

42.61.78.62 117.34.118.127 186.15.156.96 202.62.226.26
58.64.209.254 70.45.104.86 58.27.207.166 123.16.13.29
200.48.237.52 114.122.106.195 91.185.20.170 101.234.76.163
45.116.232.40 213.234.119.4 14.177.64.19 23.88.224.23
95.105.233.209 201.32.178.190 180.250.182.5 118.69.186.104