Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jung-gu

Region: Daejeon

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
118.42.232.33 attackbots
Port Scan: TCP/443
2020-10-12 03:15:39
118.42.232.33 attackbots
Port Scan: TCP/443
2020-10-11 19:08:18
118.42.254.103 attack
Telnet Honeypot -> Telnet Bruteforce / Login
2020-06-16 13:45:08
118.42.208.62 attackspambots
Unauthorized connection attempt detected from IP address 118.42.208.62 to port 81
2020-05-13 03:26:05
118.42.232.140 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-23 22:27:25
118.42.220.29 attackspambots
unauthorized connection attempt
2020-02-26 18:26:26
118.42.208.62 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 00:44:47
118.42.22.144 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 00:41:14
118.42.226.24 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 00:33:33
118.42.231.42 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 00:28:53
118.42.232.140 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 00:24:58
118.42.241.132 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 00:22:25
118.42.254.103 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 00:15:49
118.42.232.140 attackbotsspam
23/tcp 23/tcp 23/tcp...
[2019-12-28/2020-02-10]4pkt,1pt.(tcp)
2020-02-11 05:29:41
118.42.241.132 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-10 09:27:32
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.42.2.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50599
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.42.2.2.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031102 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 08:17:53 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 2.2.42.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.2.42.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.36.221.218 attack
Portscan or hack attempt detected by psad/fwsnort
2019-12-05 05:14:47
74.208.4.196 attackbots
SENDING FAKE EMAILS FROM CHASE TO PHISH LOGIN INFO SENT BY sherry@superior-ptg.com
2019-12-05 05:05:55
49.235.245.12 attackbotsspam
Dec  5 01:42:20 gw1 sshd[23555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.245.12
Dec  5 01:42:22 gw1 sshd[23555]: Failed password for invalid user xingixing from 49.235.245.12 port 62353 ssh2
...
2019-12-05 05:02:05
134.175.36.138 attackspambots
Dec  4 15:50:03 plusreed sshd[25793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.36.138  user=root
Dec  4 15:50:05 plusreed sshd[25793]: Failed password for root from 134.175.36.138 port 45416 ssh2
...
2019-12-05 04:58:03
106.13.198.70 attackbotsspam
Automatic report - Port Scan
2019-12-05 05:31:25
164.132.57.16 attackbots
Dec  4 21:30:14 fr01 sshd[30716]: Invalid user home from 164.132.57.16
Dec  4 21:30:14 fr01 sshd[30716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16
Dec  4 21:30:14 fr01 sshd[30716]: Invalid user home from 164.132.57.16
Dec  4 21:30:16 fr01 sshd[30716]: Failed password for invalid user home from 164.132.57.16 port 42932 ssh2
...
2019-12-05 05:29:26
222.186.175.167 attack
Dec  4 17:27:33 sshd: Connection from 222.186.175.167 port 26346
Dec  4 17:27:34 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Dec  4 17:27:36 sshd: Failed password for root from 222.186.175.167 port 26346 ssh2
Dec  4 17:27:37 sshd: Received disconnect from 222.186.175.167: 11:  [preauth]
2019-12-05 05:10:25
77.247.108.119 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 63 - port: 1778 proto: TCP cat: Misc Attack
2019-12-05 05:15:53
195.3.147.47 attackspam
Dec  4 20:26:46 herz-der-gamer sshd[24866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.3.147.47  user=root
Dec  4 20:26:49 herz-der-gamer sshd[24866]: Failed password for root from 195.3.147.47 port 27383 ssh2
...
2019-12-05 04:57:47
178.62.27.245 attack
F2B jail: sshd. Time: 2019-12-04 20:59:08, Reported by: VKReport
2019-12-05 05:32:21
128.199.200.225 attackbots
xmlrpc attack
2019-12-05 05:14:10
187.183.201.163 attackspambots
Dec  4 22:17:05 *** sshd[21945]: Failed password for invalid user kremer from 187.183.201.163 port 22498 ssh2
Dec  4 23:58:07 *** sshd[24468]: Failed password for invalid user neni from 187.183.201.163 port 64225 ssh2
2019-12-05 04:54:56
62.225.61.221 attack
Automatic report - Banned IP Access
2019-12-05 05:24:56
111.230.209.21 attack
Dec  4 21:27:02 * sshd[22382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.209.21
Dec  4 21:27:04 * sshd[22382]: Failed password for invalid user helpdesk from 111.230.209.21 port 52892 ssh2
2019-12-05 05:26:09
159.203.36.18 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-12-05 05:22:15

Recently Reported IPs

118.42.135.238 118.42.251.145 118.42.42.76 118.42.57.2
118.42.69.149 118.42.69.158 118.42.74.109 118.42.74.177
118.46.106.91 118.67.206.146 118.67.206.149 118.67.206.159
118.67.206.16 118.67.206.169 104.129.40.6 118.67.206.170
33.210.161.11 118.67.206.174 118.67.206.180 118.67.206.185