Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seongnam-si

Region: Gyeonggi-do

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.42.102.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.42.102.19.			IN	A

;; AUTHORITY SECTION:
.			556	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030101 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 11:58:00 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 19.102.42.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.102.42.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.216.139.61 attack
12/28/2019-07:27:44.635002 117.216.139.61 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-28 16:35:55
68.183.35.70 attackspam
xmlrpc attack
2019-12-28 16:20:18
178.63.11.212 attackbots
Automated report (2019-12-28T06:43:22+00:00). Misbehaving bot detected at this address.
2019-12-28 16:07:32
54.212.239.226 attackbotsspam
port scan and connect, tcp 8081 (blackice-icecap)
2019-12-28 16:28:50
200.194.13.116 attackbotsspam
Automatic report - Port Scan Attack
2019-12-28 16:01:37
62.173.145.147 attack
Invalid user www from 62.173.145.147 port 37490
2019-12-28 16:32:34
218.92.0.135 attackspambots
Dec 28 08:12:25 sshgateway sshd\[1431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135  user=root
Dec 28 08:12:27 sshgateway sshd\[1431\]: Failed password for root from 218.92.0.135 port 56846 ssh2
Dec 28 08:12:40 sshgateway sshd\[1431\]: error: maximum authentication attempts exceeded for root from 218.92.0.135 port 56846 ssh2 \[preauth\]
2019-12-28 16:15:26
165.16.203.75 attackbotsspam
Automatic report - Port Scan Attack
2019-12-28 16:03:46
117.156.67.18 attack
Dec 28 08:16:59 odroid64 sshd\[2881\]: Invalid user sinus from 117.156.67.18
Dec 28 08:16:59 odroid64 sshd\[2881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.156.67.18
...
2019-12-28 16:18:59
80.93.214.15 attackspam
$f2bV_matches
2019-12-28 16:07:46
104.243.41.97 attackspambots
Dec 28 09:25:07 server sshd\[10405\]: Invalid user sekido from 104.243.41.97
Dec 28 09:25:07 server sshd\[10405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.41.97 
Dec 28 09:25:09 server sshd\[10405\]: Failed password for invalid user sekido from 104.243.41.97 port 34916 ssh2
Dec 28 09:28:25 server sshd\[10809\]: Invalid user sekido from 104.243.41.97
Dec 28 09:28:25 server sshd\[10809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.41.97 
...
2019-12-28 16:01:09
185.156.73.38 attackspambots
Dec 28 07:28:22 mail kernel: [908196.197814] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=185.156.73.38 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=9475 PROTO=TCP SPT=41676 DPT=3342 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-28 16:04:41
129.204.198.172 attackspambots
Dec 28 07:06:01 herz-der-gamer sshd[12417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.198.172  user=uucp
Dec 28 07:06:03 herz-der-gamer sshd[12417]: Failed password for uucp from 129.204.198.172 port 40692 ssh2
Dec 28 07:28:08 herz-der-gamer sshd[12755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.198.172  user=backup
Dec 28 07:28:09 herz-der-gamer sshd[12755]: Failed password for backup from 129.204.198.172 port 46660 ssh2
...
2019-12-28 16:17:58
88.84.200.139 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-12-28 16:35:33
202.147.193.18 attack
Dec 27 22:47:37 mockhub sshd[21436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.147.193.18
Dec 27 22:47:39 mockhub sshd[21436]: Failed password for invalid user ts3 from 202.147.193.18 port 57388 ssh2
...
2019-12-28 16:23:01

Recently Reported IPs

115.188.185.20 206.126.73.46 223.61.255.68 79.36.77.40
55.92.33.148 122.64.239.21 223.242.140.37 129.36.231.53
170.112.17.31 147.148.248.225 177.223.34.81 128.232.249.2
154.142.104.217 89.121.13.55 51.118.49.148 59.239.129.37
126.243.159.200 90.50.76.96 126.147.220.224 99.84.154.244