Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.142.210.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.142.210.42.			IN	A

;; AUTHORITY SECTION:
.			177	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 17:12:19 CST 2023
;; MSG SIZE  rcvd: 107
Host info
b'Host 42.210.142.103.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 42.210.142.103.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
141.98.80.204 attackbots
Scanning for open ports
2020-02-27 03:00:42
222.186.180.41 attackbotsspam
Feb 26 16:11:46 firewall sshd[22104]: Failed password for root from 222.186.180.41 port 9956 ssh2
Feb 26 16:11:50 firewall sshd[22104]: Failed password for root from 222.186.180.41 port 9956 ssh2
Feb 26 16:11:54 firewall sshd[22104]: Failed password for root from 222.186.180.41 port 9956 ssh2
...
2020-02-27 03:16:44
107.152.164.217 attackspambots
MYH,DEF GET http://meyerpantalones.es/magmi/web/magmi.php
2020-02-27 03:08:48
185.87.123.170 attackbotsspam
WP Exploit wp-login.php?action=register
2020-02-27 02:58:03
54.200.182.16 attackspambots
02/26/2020-20:22:50.941541 54.200.182.16 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-27 03:27:14
210.211.116.204 attack
$f2bV_matches
2020-02-27 03:11:26
104.131.217.180 attackbots
DigitalOcean BotNet attack - 10s of requests to non-existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
node-superagent/4.1.0
2020-02-27 03:15:56
61.7.235.85 attackspam
suspicious action Wed, 26 Feb 2020 10:35:18 -0300
2020-02-27 02:59:07
49.235.13.226 attackbots
Port scan on 2 port(s): 2375 2376
2020-02-27 02:59:59
210.211.101.58 attackspam
$f2bV_matches
2020-02-27 03:12:48
122.141.234.179 attackspambots
suspicious action Wed, 26 Feb 2020 10:35:22 -0300
2020-02-27 02:57:15
103.248.83.249 attack
Feb 26 19:47:23 vpn01 sshd[32144]: Failed password for root from 103.248.83.249 port 44392 ssh2
...
2020-02-27 03:17:15
210.202.8.30 attackbots
$f2bV_matches
2020-02-27 03:18:33
106.13.111.28 attackspam
DATE:2020-02-26 15:02:04, IP:106.13.111.28, PORT:ssh SSH brute force auth (docker-dc)
2020-02-27 03:32:30
210.196.153.9 attackbotsspam
$f2bV_matches
2020-02-27 03:19:57

Recently Reported IPs

140.116.34.161 139.18.118.21 79.170.108.82 147.251.55.35
140.116.16.82 140.116.118.12 223.80.137.135 140.116.183.8
140.116.243.241 114.79.47.225 131.155.2.3 120.110.21.242
140.116.73.2 91.10.215.6 223.255.224.102 140.116.235.189
140.116.58.122 140.116.253.172 128.239.211.194 120.110.84.31