Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.42.242.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46819
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.42.242.214.			IN	A

;; AUTHORITY SECTION:
.			306	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 20:46:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
214.242.42.109.in-addr.arpa domain name pointer ip-109-42-242-214.web.vodafone.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.242.42.109.in-addr.arpa	name = ip-109-42-242-214.web.vodafone.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.0.8.134 attackbots
Aug 14 20:47:57 propaganda sshd[5753]: Connection from 190.0.8.134 port 14166 on 10.0.0.161 port 22 rdomain ""
Aug 14 20:47:57 propaganda sshd[5753]: Connection closed by 190.0.8.134 port 14166 [preauth]
2020-08-15 20:00:23
183.162.79.39 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2020-08-15 20:03:37
147.50.135.171 attackbotsspam
2020-08-15T13:32:41.871677vps773228.ovh.net sshd[1450]: Failed password for root from 147.50.135.171 port 33828 ssh2
2020-08-15T13:37:14.466518vps773228.ovh.net sshd[1488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.135.171  user=root
2020-08-15T13:37:16.711456vps773228.ovh.net sshd[1488]: Failed password for root from 147.50.135.171 port 43548 ssh2
2020-08-15T13:41:50.855662vps773228.ovh.net sshd[1522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.135.171  user=root
2020-08-15T13:41:53.320075vps773228.ovh.net sshd[1522]: Failed password for root from 147.50.135.171 port 53260 ssh2
...
2020-08-15 19:51:22
115.159.91.202 attackbotsspam
Aug 15 05:39:52 serwer sshd\[9715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.91.202  user=root
Aug 15 05:39:54 serwer sshd\[9715\]: Failed password for root from 115.159.91.202 port 51292 ssh2
Aug 15 05:44:19 serwer sshd\[13091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.91.202  user=root
...
2020-08-15 20:25:49
36.82.250.138 attack
1597463237 - 08/15/2020 05:47:17 Host: 36.82.250.138/36.82.250.138 Port: 445 TCP Blocked
2020-08-15 20:25:32
219.78.62.112 attackspam
" "
2020-08-15 20:16:25
132.148.104.36 attackspam
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-15 19:53:30
164.132.145.70 attack
Aug 15 12:41:28 ip40 sshd[25802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.145.70 
Aug 15 12:41:30 ip40 sshd[25802]: Failed password for invalid user PassWord!@# from 164.132.145.70 port 57668 ssh2
...
2020-08-15 20:09:12
79.103.231.210 attackspam
" "
2020-08-15 19:54:58
186.190.238.230 attack
2020-08-10T15:11:29.382358srv.ecualinux.com sshd[25108]: Invalid user openhabian from 186.190.238.230 port 49643
2020-08-10T15:11:32.063208srv.ecualinux.com sshd[25108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.190.238.230
2020-08-10T15:11:29.382358srv.ecualinux.com sshd[25108]: Invalid user openhabian from 186.190.238.230 port 49643
2020-08-10T15:11:34.160529srv.ecualinux.com sshd[25108]: Failed password for invalid user openhabian from 186.190.238.230 port 49643 ssh2
2020-08-10T15:12:27.736857srv.ecualinux.com sshd[25154]: Invalid user netscreen from 186.190.238.230 port 34596
2020-08-10T15:12:30.297425srv.ecualinux.com sshd[25154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.190.238.230
2020-08-10T15:12:27.736857srv.ecualinux.com sshd[25154]: Invalid user netscreen from 186.190.238.230 port 34596
2020-08-10T15:12:32.023366srv.ecualinux.com sshd[25154]: Failed password fo........
------------------------------
2020-08-15 20:16:41
96.9.249.132 attackspam
This Ip address is part of a scam operation to steal your money from your bank account and through bitcoin. This guy steals money with help of using other women’s accounts he sets up in your account. Your money eventually is sent here.
2020-08-15 19:53:01
188.125.170.161 attackbots
SpamScore above: 10.0
2020-08-15 20:00:54
103.205.179.22 attack
Port Scan
...
2020-08-15 19:46:57
184.105.139.108 attackbotsspam
27017/tcp 50075/tcp 4899/tcp...
[2020-06-14/08-15]20pkt,10pt.(tcp),1pt.(udp)
2020-08-15 19:46:21
150.129.8.17 attackbots
Automatic report - Banned IP Access
2020-08-15 20:01:59

Recently Reported IPs

109.40.242.26 29.160.191.161 109.48.146.103 109.49.178.127
109.56.207.150 109.57.249.148 109.57.5.244 244.39.41.151
109.60.92.133 109.62.147.109 109.62.192.208 109.62.194.4
247.149.15.13 109.62.219.22 109.62.241.11 109.64.205.123
109.64.205.212 109.64.73.49 109.64.93.180 109.65.199.137