Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.80.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9822
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.80.42.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 18:45:22 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 42.80.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.80.42.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.199.34.54 attackbotsspam
Invalid user cpaneleximfilter from 139.199.34.54 port 11931
2020-03-11 17:17:46
119.28.133.210 attack
Mar 11 09:38:25 * sshd[20850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.133.210
Mar 11 09:38:27 * sshd[20850]: Failed password for invalid user bilder.dlrg-heimbach@1234 from 119.28.133.210 port 39854 ssh2
2020-03-11 17:22:54
178.159.44.221 attack
(sshd) Failed SSH login from 178.159.44.221 (BY/Belarus/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 11 09:28:06 amsweb01 sshd[13701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.44.221  user=root
Mar 11 09:28:08 amsweb01 sshd[13701]: Failed password for root from 178.159.44.221 port 40120 ssh2
Mar 11 09:31:46 amsweb01 sshd[14030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.44.221  user=root
Mar 11 09:31:48 amsweb01 sshd[14030]: Failed password for root from 178.159.44.221 port 40888 ssh2
Mar 11 09:33:45 amsweb01 sshd[14189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.44.221  user=root
2020-03-11 17:12:58
192.241.175.48 attackspam
(sshd) Failed SSH login from 192.241.175.48 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 11 09:30:18 ubnt-55d23 sshd[26812]: Invalid user system from 192.241.175.48 port 43632
Mar 11 09:30:19 ubnt-55d23 sshd[26812]: Failed password for invalid user system from 192.241.175.48 port 43632 ssh2
2020-03-11 17:10:12
51.254.51.182 attackspam
Invalid user rezzorox from 51.254.51.182 port 54726
2020-03-11 17:03:41
181.28.233.141 attack
Invalid user ivan from 181.28.233.141 port 27201
2020-03-11 17:12:11
196.46.192.73 attackspambots
Invalid user webapps from 196.46.192.73 port 43998
2020-03-11 16:45:07
145.239.239.83 attackspambots
Invalid user prueba from 145.239.239.83 port 43176
2020-03-11 17:17:31
95.85.26.23 attack
SSH Brute-Force reported by Fail2Ban
2020-03-11 16:59:30
167.114.98.234 attackbotsspam
Invalid user narciso from 167.114.98.234 port 42304
2020-03-11 17:14:11
114.84.181.220 attack
Invalid user abdullah from 114.84.181.220 port 47337
2020-03-11 16:54:05
35.186.145.141 attackbotsspam
Invalid user public from 35.186.145.141 port 52044
2020-03-11 17:05:54
138.68.4.8 attackspam
Invalid user hammad from 138.68.4.8 port 33950
2020-03-11 17:18:54
178.62.90.225 attack
Invalid user e from 178.62.90.225 port 40426
2020-03-11 17:13:52
211.157.179.38 attack
Invalid user vnc from 211.157.179.38 port 39149
2020-03-11 16:43:33

Recently Reported IPs

119.42.80.40 119.42.80.44 119.42.80.46 119.42.80.50
119.42.80.52 119.42.80.48 119.42.80.54 119.42.80.56
119.42.80.58 119.42.80.6 119.42.80.60 119.42.80.62
117.158.184.250 119.42.80.64 119.42.80.68 119.42.80.66
119.42.80.71 119.42.80.72 119.42.80.74 119.42.80.79