Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.89.207.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.89.207.42.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:30:51 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.207.89.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.207.89.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
152.168.245.31 attack
Apr 14 00:45:36 webhost01 sshd[19749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.245.31
Apr 14 00:45:39 webhost01 sshd[19749]: Failed password for invalid user hl2rp from 152.168.245.31 port 44807 ssh2
...
2020-04-14 07:53:17
51.154.18.140 attackbots
[ssh] SSH attack
2020-04-14 07:48:34
125.62.197.177 attackbots
DATE:2020-04-13 19:12:32, IP:125.62.197.177, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-04-14 07:50:45
61.35.152.114 attack
2020-04-13 16:38:31,862 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 61.35.152.114
2020-04-13 17:16:30,412 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 61.35.152.114
2020-04-13 17:54:57,181 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 61.35.152.114
2020-04-13 18:33:13,938 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 61.35.152.114
2020-04-13 19:12:00,627 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 61.35.152.114
...
2020-04-14 08:11:44
31.207.45.90 attack
DATE:2020-04-13 19:12:05, IP:31.207.45.90, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-04-14 08:09:42
51.77.146.153 attackbots
prod3
...
2020-04-14 07:43:32
167.71.118.16 attackspam
Automatic report - XMLRPC Attack
2020-04-14 07:44:54
51.144.86.109 attackbotsspam
Apr 13 22:19:41 XXX sshd[52372]: Invalid user admin from 51.144.86.109 port 11200
2020-04-14 08:07:33
162.243.133.48 attack
" "
2020-04-14 07:56:15
118.24.255.100 attackspam
2020-04-13T22:51:42.980616homeassistant sshd[2097]: Invalid user biz from 118.24.255.100 port 55380
2020-04-13T22:51:42.987000homeassistant sshd[2097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.255.100
...
2020-04-14 08:04:43
192.99.34.42 attack
www noscript
...
2020-04-14 08:03:57
217.111.239.37 attackbots
Apr 13 19:35:44 firewall sshd[20089]: Failed password for root from 217.111.239.37 port 36982 ssh2
Apr 13 19:39:02 firewall sshd[20216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.111.239.37  user=root
Apr 13 19:39:04 firewall sshd[20216]: Failed password for root from 217.111.239.37 port 46622 ssh2
...
2020-04-14 07:40:10
81.183.222.181 attack
(sshd) Failed SSH login from 81.183.222.181 (HU/Hungary/dsl51B7DEB5.fixip.t-online.hu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 14 00:05:34 elude sshd[2954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.222.181  user=root
Apr 14 00:05:36 elude sshd[2954]: Failed password for root from 81.183.222.181 port 49830 ssh2
Apr 14 00:19:53 elude sshd[5200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.222.181  user=root
Apr 14 00:19:55 elude sshd[5200]: Failed password for root from 81.183.222.181 port 46632 ssh2
Apr 14 00:27:16 elude sshd[6337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.222.181  user=root
2020-04-14 07:56:53
88.87.79.136 attackbotsspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-04-14 08:00:53
106.13.52.209 attack
Lines containing failures of 106.13.52.209
Apr 13 00:38:36 kmh-vmh-003-fsn07 sshd[17788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.209  user=r.r
Apr 13 00:38:38 kmh-vmh-003-fsn07 sshd[17788]: Failed password for r.r from 106.13.52.209 port 54306 ssh2
Apr 13 00:38:39 kmh-vmh-003-fsn07 sshd[17788]: Received disconnect from 106.13.52.209 port 54306:11: Bye Bye [preauth]
Apr 13 00:38:39 kmh-vmh-003-fsn07 sshd[17788]: Disconnected from authenticating user r.r 106.13.52.209 port 54306 [preauth]
Apr 13 00:47:00 kmh-vmh-003-fsn07 sshd[19250]: Invalid user annie from 106.13.52.209 port 33526
Apr 13 00:47:00 kmh-vmh-003-fsn07 sshd[19250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.209 
Apr 13 00:47:02 kmh-vmh-003-fsn07 sshd[19250]: Failed password for invalid user annie from 106.13.52.209 port 33526 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.13
2020-04-14 08:11:00

Recently Reported IPs

118.89.144.13 118.89.213.145 118.89.213.22 118.89.214.103
118.89.214.89 118.89.53.64 118.89.97.138 118.89.248.219
118.91.163.182 118.91.74.58 118.92.229.67 118.91.189.207
118.91.189.205 118.91.189.202 118.96.200.141 118.96.135.36
118.97.51.133 118.98.227.101 118.96.238.229 118.98.34.92