Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.42.49.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.42.49.214.			IN	A

;; AUTHORITY SECTION:
.			122	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 19:16:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 214.49.42.112.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 214.49.42.112.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
49.234.51.242 attackbots
Nov  4 16:22:57 dedicated sshd[13960]: Invalid user fh from 49.234.51.242 port 51880
2019-11-05 01:42:24
61.160.215.24 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 54 - port: 3306 proto: TCP cat: Misc Attack
2019-11-05 01:16:37
185.176.27.254 attack
11/04/2019-12:48:35.476029 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-05 01:52:22
37.187.122.195 attackspambots
sshd jail - ssh hack attempt
2019-11-05 01:28:58
78.157.60.17 attackspambots
Automatic report - Banned IP Access
2019-11-05 01:47:09
5.160.33.35 attack
Unauthorized connection attempt from IP address 5.160.33.35 on Port 445(SMB)
2019-11-05 01:25:34
103.111.80.70 attackspambots
Unauthorized connection attempt from IP address 103.111.80.70 on Port 445(SMB)
2019-11-05 01:25:18
61.161.125.1 attack
Nov  4 15:25:48 jane sshd[14347]: Failed password for www-data from 61.161.125.1 port 37294 ssh2
...
2019-11-05 01:31:02
51.15.167.124 attackbotsspam
Nov  4 17:38:26 srv01 sshd[7299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.resistance.cf  user=root
Nov  4 17:38:28 srv01 sshd[7299]: Failed password for root from 51.15.167.124 port 35878 ssh2
Nov  4 17:43:40 srv01 sshd[7541]: Invalid user com from 51.15.167.124
Nov  4 17:43:40 srv01 sshd[7541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.resistance.cf
Nov  4 17:43:40 srv01 sshd[7541]: Invalid user com from 51.15.167.124
Nov  4 17:43:42 srv01 sshd[7541]: Failed password for invalid user com from 51.15.167.124 port 46996 ssh2
...
2019-11-05 01:55:10
50.232.156.154 attackspam
Automatic report - XMLRPC Attack
2019-11-05 01:20:13
147.50.6.1 attack
Unauthorized connection attempt from IP address 147.50.6.1 on Port 445(SMB)
2019-11-05 01:21:10
41.38.59.113 attack
Unauthorized connection attempt from IP address 41.38.59.113 on Port 445(SMB)
2019-11-05 01:18:54
125.161.130.5 attackspam
Unauthorized connection attempt from IP address 125.161.130.5 on Port 445(SMB)
2019-11-05 01:36:31
62.210.144.167 attack
web-1 [ssh_2] SSH Attack
2019-11-05 01:47:22
106.12.16.107 attackbots
ssh failed login
2019-11-05 01:53:13

Recently Reported IPs

176.67.114.218 116.31.165.198 113.180.70.126 27.7.13.255
201.211.44.14 221.141.3.123 131.0.23.147 116.68.100.27
82.178.248.62 172.104.185.163 200.188.152.196 51.107.101.195
178.128.53.189 185.82.216.158 151.238.127.118 181.81.23.108
39.162.185.134 223.239.128.138 111.229.118.46 91.92.41.168