Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.42.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.42.202.			IN	A

;; AUTHORITY SECTION:
.			155	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122900 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 23:57:07 CST 2021
;; MSG SIZE  rcvd: 104
Host info
Host 202.42.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 202.42.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.71.234.134 attack
Invalid user robbin from 167.71.234.134 port 40602
2020-04-29 03:35:56
180.105.39.143 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-04-29 03:28:02
196.250.44.163 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-29 03:37:51
222.186.180.8 attackbotsspam
Apr 28 21:52:27 sso sshd[16794]: Failed password for root from 222.186.180.8 port 32736 ssh2
Apr 28 21:52:38 sso sshd[16794]: Failed password for root from 222.186.180.8 port 32736 ssh2
...
2020-04-29 03:53:12
103.84.63.5 attackbots
Apr 28 14:07:19 haigwepa sshd[18716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.63.5 
Apr 28 14:07:21 haigwepa sshd[18716]: Failed password for invalid user administrator from 103.84.63.5 port 55752 ssh2
...
2020-04-29 03:51:09
182.76.214.98 attackbots
Honeypot attack, port: 445, PTR: nsg-static-98.214.76.182-airtel.com.
2020-04-29 03:30:53
83.167.87.198 attackspam
DATE:2020-04-28 15:44:05, IP:83.167.87.198, PORT:ssh SSH brute force auth (docker-dc)
2020-04-29 03:22:48
171.225.241.127 attack
Tried to log-in to my account. Didn't work because of my password strength but also because I have security measures set-up to notify me and also prevent outsider's from getting in but apparently this guy has been busy recently too. All over the world!
2020-04-29 03:55:11
209.97.138.179 attackbotsspam
Apr 28 00:00:37 mxgate1 sshd[25934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.138.179  user=postgres
Apr 28 00:00:39 mxgate1 sshd[25934]: Failed password for postgres from 209.97.138.179 port 40320 ssh2
Apr 28 00:00:39 mxgate1 sshd[25934]: Received disconnect from 209.97.138.179 port 40320:11: Bye Bye [preauth]
Apr 28 00:00:39 mxgate1 sshd[25934]: Disconnected from 209.97.138.179 port 40320 [preauth]
Apr 28 00:11:15 mxgate1 sshd[26661]: Invalid user rud from 209.97.138.179 port 40090
Apr 28 00:11:15 mxgate1 sshd[26661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.138.179
Apr 28 00:11:17 mxgate1 sshd[26661]: Failed password for invalid user rud from 209.97.138.179 port 40090 ssh2
Apr 28 00:11:17 mxgate1 sshd[26661]: Received disconnect from 209.97.138.179 port 40090:11: Bye Bye [preauth]
Apr 28 00:11:17 mxgate1 sshd[26661]: Disconnected from 209.97.138.179 port 40090 ........
-------------------------------
2020-04-29 03:39:18
188.68.255.215 attackspambots
SpamScore above: 10.0
2020-04-29 03:41:53
200.195.174.228 attackspambots
Invalid user dmj from 200.195.174.228 port 49782
2020-04-29 03:48:15
114.103.14.35 attackbots
"fail2ban match"
2020-04-29 03:57:17
54.188.241.53 attack
bezos(c)raper
2020-04-29 03:31:10
46.101.128.28 attackbotsspam
5x Failed Password
2020-04-29 03:30:24
198.27.82.182 attack
Invalid user coop from 198.27.82.182 port 51664
2020-04-29 03:59:57

Recently Reported IPs

121.154.216.26 176.83.150.113 79.158.186.148 203.127.200.133
91.100.164.212 53.216.129.181 219.172.79.86 123.116.216.220
158.1.66.141 176.59.194.17 115.177.200.21 116.16.216.248
125.221.232.94 23.59.101.224 227.105.135.39 207.97.217.108
207.43.172.210 57.131.177.149 137.35.100.121 177.224.22.142