Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
119.42.72.31 attack
1593742241 - 07/03/2020 04:10:41 Host: 119.42.72.31/119.42.72.31 Port: 445 TCP Blocked
2020-07-03 22:21:10
119.42.72.156 attack
lfd: (smtpauth) Failed SMTP AUTH login from 119.42.72.156 (-): 5 in the last 3600 secs - Sat Jun  2 13:31:37 2018
2020-04-30 18:58:16
119.42.72.226 attack
1584941832 - 03/23/2020 06:37:12 Host: 119.42.72.226/119.42.72.226 Port: 445 TCP Blocked
2020-03-23 14:34:39
119.42.72.209 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 16:23:02
119.42.72.202 attackspambots
unauthorized connection attempt
2020-01-09 15:48:01
119.42.72.172 attackspam
1577255112 - 12/25/2019 07:25:12 Host: 119.42.72.172/119.42.72.172 Port: 445 TCP Blocked
2019-12-25 18:12:48
119.42.72.49 attackspambots
Unauthorized connection attempt from IP address 119.42.72.49 on Port 445(SMB)
2019-11-27 00:38:07
119.42.72.57 attackspambots
Unauthorised access (Nov  1) SRC=119.42.72.57 LEN=52 TTL=114 ID=4071 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-02 03:48:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.72.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.72.5.			IN	A

;; AUTHORITY SECTION:
.			120	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 14:52:20 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 5.72.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.72.42.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.213.153.151 attack
account brute force by foreign IP
2019-08-06 10:56:28
142.93.36.29 attackbotsspam
Aug  6 04:01:37 debian sshd\[10950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.36.29  user=root
Aug  6 04:01:40 debian sshd\[10950\]: Failed password for root from 142.93.36.29 port 32976 ssh2
...
2019-08-06 11:05:05
114.99.114.63 attackbotsspam
account brute force by foreign IP
2019-08-06 11:23:37
218.65.68.170 attack
account brute force by foreign IP
2019-08-06 11:09:45
223.242.247.121 attackspam
account brute force by foreign IP
2019-08-06 10:36:14
46.3.96.69 attackbotsspam
" "
2019-08-06 11:18:24
115.221.122.185 attackbots
account brute force by foreign IP
2019-08-06 10:52:05
113.101.158.27 attackbotsspam
account brute force by foreign IP
2019-08-06 11:17:34
117.90.3.224 attack
account brute force by foreign IP
2019-08-06 10:52:37
121.232.148.7 attackbots
account brute force by foreign IP
2019-08-06 10:49:02
36.226.96.236 attack
Honeypot attack, port: 23, PTR: 36-226-96-236.dynamic-ip.hinet.net.
2019-08-06 10:40:26
117.60.208.4 attackbotsspam
account brute force by foreign IP
2019-08-06 10:56:04
183.131.18.174 attack
Unauthorised access (Aug  6) SRC=183.131.18.174 LEN=52 TTL=49 ID=25659 DF TCP DPT=1433 WINDOW=14600 SYN
2019-08-06 10:46:56
110.133.53.217 attackbotsspam
Honeypot attack, port: 23, PTR: 110-133-53-217.rev.home.ne.jp.
2019-08-06 11:15:32
79.173.208.225 attackbotsspam
Honeypot attack, port: 23, PTR: 79.173.x.225.go.com.jo.
2019-08-06 10:34:57

Recently Reported IPs

119.42.72.47 119.42.72.51 119.42.72.52 119.42.72.56
119.42.72.58 119.42.72.60 119.42.72.69 119.42.72.70
119.42.72.72 119.42.72.74 119.42.72.75 119.42.72.77
119.42.72.79 119.42.72.8 119.42.72.80 119.42.72.82
119.42.72.84 119.42.72.87 119.42.72.91 116.170.35.1