Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
119.42.97.65 attackspambots
scan z
2019-11-23 19:06:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.42.97.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.42.97.34.			IN	A

;; AUTHORITY SECTION:
.			227	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 18:49:24 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 34.97.42.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.97.42.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.31.226.28 attackbotsspam
Jan  9 02:07:03 nxxxxxxx0 sshd[29884]: Did not receive identification string from 119.31.226.28
Jan  9 02:08:46 nxxxxxxx0 sshd[29971]: Connection closed by 119.31.226.28 [preauth]
Jan x@x
Jan  9 02:12:31 nxxxxxxx0 sshd[30206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.31.226.28 
Jan x@x
Jan  9 02:12:35 nxxxxxxx0 sshd[30206]: Received disconnect from 119.31.226.28: 11: Bye Bye [preauth]
Jan  9 02:19:54 nxxxxxxx0 sshd[30617]: Did not receive identification string from 119.31.226.28
Jan x@x
Jan  9 02:21:46 nxxxxxxx0 sshd[30742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.31.226.28 
Jan x@x
Jan  9 02:21:48 nxxxxxxx0 sshd[30742]: Received disconnect from 119.31.226.28: 11: Bye Bye [preauth]
Jan  9 02:23:35 nxxxxxxx0 sshd[30831]: Did not receive identification string from 119.31.226.28
Jan  9 02:25:23 nxxxxxxx0 sshd[30930]: Connection closed by 119.31.226.28 [preauth]
Jan x@x
Ja........
-------------------------------
2020-01-10 01:50:41
211.195.117.212 attackspambots
2020-01-09T15:25:00.844880scmdmz1 sshd[18381]: Invalid user lurdes from 211.195.117.212 port 43852
2020-01-09T15:25:00.847431scmdmz1 sshd[18381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.117.212
2020-01-09T15:25:00.844880scmdmz1 sshd[18381]: Invalid user lurdes from 211.195.117.212 port 43852
2020-01-09T15:25:03.176216scmdmz1 sshd[18381]: Failed password for invalid user lurdes from 211.195.117.212 port 43852 ssh2
2020-01-09T15:27:22.755261scmdmz1 sshd[18568]: Invalid user vki from 211.195.117.212 port 63300
...
2020-01-10 02:01:09
185.176.27.98 attack
01/09/2020-19:07:30.539196 185.176.27.98 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-10 02:09:28
218.92.0.178 attackbotsspam
Jan  9 18:56:33 ArkNodeAT sshd\[28979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
Jan  9 18:56:35 ArkNodeAT sshd\[28979\]: Failed password for root from 218.92.0.178 port 10346 ssh2
Jan  9 18:56:55 ArkNodeAT sshd\[28982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
2020-01-10 02:17:51
92.63.194.26 attack
Jan  9 18:07:56 sxvn sshd[941530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26
2020-01-10 02:10:44
178.16.175.146 attackspambots
Jan  9 18:50:28 plex sshd[15578]: Invalid user ger from 178.16.175.146 port 26970
2020-01-10 02:01:35
151.233.55.246 attackbotsspam
Automatic report - Port Scan Attack
2020-01-10 02:03:29
39.66.229.177 attackbotsspam
Honeypot hit.
2020-01-10 02:23:26
107.13.186.21 attackspambots
SSH Brute Force, server-1 sshd[22643]: Failed password for invalid user user from 107.13.186.21 port 36848 ssh2
2020-01-10 02:18:31
222.186.175.212 attackspam
Jan  9 18:43:56 vps647732 sshd[9041]: Failed password for root from 222.186.175.212 port 59892 ssh2
Jan  9 18:44:09 vps647732 sshd[9041]: error: maximum authentication attempts exceeded for root from 222.186.175.212 port 59892 ssh2 [preauth]
...
2020-01-10 01:47:39
192.241.249.226 attack
1578591285 - 01/09/2020 18:34:45 Host: 192.241.249.226/192.241.249.226 Port: 22 TCP Blocked
2020-01-10 01:55:10
193.169.253.86 attackbotsspam
Unauthorized connection attempt detected from IP address 193.169.253.86 to port 8545
2020-01-10 02:07:53
80.211.30.166 attackbotsspam
3x Failed Password
2020-01-10 02:14:18
185.153.196.48 attackbots
Jan  9 18:45:42 h2177944 kernel: \[1790450.964415\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.196.48 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=1392 PROTO=TCP SPT=53504 DPT=18933 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  9 18:45:42 h2177944 kernel: \[1790450.964430\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.196.48 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=1392 PROTO=TCP SPT=53504 DPT=18933 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  9 18:52:25 h2177944 kernel: \[1790853.834114\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.196.48 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=6430 PROTO=TCP SPT=53502 DPT=12580 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  9 18:52:25 h2177944 kernel: \[1790853.834128\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.196.48 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=6430 PROTO=TCP SPT=53502 DPT=12580 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  9 18:54:24 h2177944 kernel: \[1790973.166355\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.196.48 DST=85.214.
2020-01-10 02:19:22
95.61.93.106 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-01-10 01:56:35

Recently Reported IPs

119.42.97.70 119.42.97.78 119.42.97.248 119.42.97.254
119.42.97.93 119.42.97.91 117.173.139.150 119.42.97.94
119.42.98.10 119.42.98.104 119.42.98.102 119.42.98.15
119.42.98.13 119.42.98.145 119.42.98.111 119.42.98.109
119.42.98.152 119.42.98.17 119.42.98.158 119.42.98.170