Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.160.40.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.160.40.242.			IN	A

;; AUTHORITY SECTION:
.			348	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 06:48:44 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 242.40.160.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.40.160.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
110.37.223.142 attack
Port Scan
...
2020-07-16 07:01:12
122.225.230.10 attackspam
2020-07-16T01:42:46.247904afi-git.jinr.ru sshd[3981]: Invalid user seneca from 122.225.230.10 port 53564
2020-07-16T01:42:46.251156afi-git.jinr.ru sshd[3981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.225.230.10
2020-07-16T01:42:46.247904afi-git.jinr.ru sshd[3981]: Invalid user seneca from 122.225.230.10 port 53564
2020-07-16T01:42:48.785802afi-git.jinr.ru sshd[3981]: Failed password for invalid user seneca from 122.225.230.10 port 53564 ssh2
2020-07-16T01:46:00.084009afi-git.jinr.ru sshd[4741]: Invalid user fergus from 122.225.230.10 port 47520
...
2020-07-16 06:51:46
52.252.6.173 attackbots
Jul 16 01:02:05 rancher-0 sshd[352813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.252.6.173  user=root
Jul 16 01:02:07 rancher-0 sshd[352813]: Failed password for root from 52.252.6.173 port 64426 ssh2
...
2020-07-16 07:16:12
125.65.79.72 attackbotsspam
Jul 15 23:32:09 rocket sshd[14281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.65.79.72
Jul 15 23:32:11 rocket sshd[14281]: Failed password for invalid user rookie from 125.65.79.72 port 44584 ssh2
...
2020-07-16 06:56:30
180.76.158.139 attackbots
Jul 15 23:06:42 ajax sshd[6421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.158.139 
Jul 15 23:06:45 ajax sshd[6421]: Failed password for invalid user petro from 180.76.158.139 port 50454 ssh2
2020-07-16 06:59:53
59.13.125.142 attackbots
Jul 16 00:19:37 * sshd[19085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.13.125.142
Jul 16 00:19:39 * sshd[19085]: Failed password for invalid user icn from 59.13.125.142 port 59593 ssh2
2020-07-16 06:51:25
59.127.25.77 attackbotsspam
Jul 16 00:06:41 debian-2gb-nbg1-2 kernel: \[17109363.548132\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=59.127.25.77 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=51608 PROTO=TCP SPT=5713 DPT=23 WINDOW=1089 RES=0x00 SYN URGP=0
2020-07-16 07:06:37
106.52.248.175 attack
Jul 16 01:06:54 jane sshd[16157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.248.175 
Jul 16 01:06:56 jane sshd[16157]: Failed password for invalid user icaro from 106.52.248.175 port 52436 ssh2
...
2020-07-16 07:11:05
163.179.126.39 attackbotsspam
Fail2Ban - SSH Bruteforce Attempt
2020-07-16 07:10:28
58.230.147.230 attackspam
1390. On Jul 15 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 58.230.147.230.
2020-07-16 06:54:36
3.133.103.183 attackspambots
mue-Direct access to plugin not allowed
2020-07-16 07:14:55
54.39.57.1 attackspambots
1389. On Jul 15 2020 experienced a Brute Force SSH login attempt -> 13 unique times by 54.39.57.1.
2020-07-16 06:55:14
111.231.83.177 attackbotsspam
Jul 16 01:07:04 jane sshd[16308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.83.177 
Jul 16 01:07:06 jane sshd[16308]: Failed password for invalid user lo from 111.231.83.177 port 40494 ssh2
...
2020-07-16 07:08:12
54.37.154.113 attackspambots
Jul 15 22:36:55 onepixel sshd[2119570]: Invalid user zqy from 54.37.154.113 port 37958
Jul 15 22:36:55 onepixel sshd[2119570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.154.113 
Jul 15 22:36:55 onepixel sshd[2119570]: Invalid user zqy from 54.37.154.113 port 37958
Jul 15 22:36:57 onepixel sshd[2119570]: Failed password for invalid user zqy from 54.37.154.113 port 37958 ssh2
Jul 15 22:41:29 onepixel sshd[2122174]: Invalid user lzl from 54.37.154.113 port 52024
2020-07-16 06:58:30
164.132.41.67 attackspam
"fail2ban match"
2020-07-16 07:10:06

Recently Reported IPs

105.12.3.5 105.174.30.162 10.31.69.1 105.184.181.181
105.184.74.138 105.19.49.182 105.209.41.40 105.209.43.181
105.21.64.122 105.21.64.126 105.21.8.98 105.212.59.35
105.212.93.201 105.213.105.0 105.213.108.121 105.213.119.3
105.213.123.107 105.213.125.9 105.213.70.42 105.213.73.227