Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.42.131.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39449
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.42.131.105.			IN	A

;; AUTHORITY SECTION:
.			181	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 19:08:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
105.131.42.12.in-addr.arpa domain name pointer www.tradingplacesparkcity.com.
105.131.42.12.in-addr.arpa domain name pointer qa1.cssintl.com.
105.131.42.12.in-addr.arpa domain name pointer qa1.resortsolutions.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.131.42.12.in-addr.arpa	name = www.tradingplacesparkcity.com.
105.131.42.12.in-addr.arpa	name = qa1.cssintl.com.
105.131.42.12.in-addr.arpa	name = qa1.resortsolutions.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.181.161.7 attackspam
Unauthorized connection attempt from IP address 66.181.161.7 on Port 445(SMB)
2019-12-28 22:44:19
185.215.63.200 attackbots
Honeypot attack, port: 23, PTR: E4186B01C4FD.mldns.ru.
2019-12-28 22:29:03
46.151.210.60 attackbotsspam
Dec 28 14:59:16 mail1 sshd\[25682\]: Invalid user rpc from 46.151.210.60 port 43954
Dec 28 14:59:16 mail1 sshd\[25682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.151.210.60
Dec 28 14:59:18 mail1 sshd\[25682\]: Failed password for invalid user rpc from 46.151.210.60 port 43954 ssh2
Dec 28 15:18:56 mail1 sshd\[2313\]: Invalid user tille from 46.151.210.60 port 43606
Dec 28 15:18:56 mail1 sshd\[2313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.151.210.60
...
2019-12-28 22:29:53
211.159.175.1 attackspam
Dec 28 15:28:49 [host] sshd[6406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.175.1  user=root
Dec 28 15:28:52 [host] sshd[6406]: Failed password for root from 211.159.175.1 port 55510 ssh2
Dec 28 15:31:00 [host] sshd[6487]: Invalid user fanner from 211.159.175.1
2019-12-28 22:37:37
146.0.16.55 attack
Hits on port : 445
2019-12-28 22:30:26
198.143.155.141 attackspam
firewall-block, port(s): 2086/tcp
2019-12-28 22:39:14
159.203.7.81 attackspambots
Invalid user admin from 159.203.7.81 port 48401
2019-12-28 22:10:26
91.232.10.231 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-28 22:14:39
159.203.201.42 attackbotsspam
Unauthorized connection attempt detected from IP address 159.203.201.42 to port 118
2019-12-28 22:29:33
80.82.77.132 attackspam
Honeypot attack, port: 389, PTR: PTR record not found
2019-12-28 22:25:14
118.24.213.107 attack
(sshd) Failed SSH login from 118.24.213.107 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Dec 28 12:16:30 andromeda sshd[17779]: Invalid user braarvig from 118.24.213.107 port 52392
Dec 28 12:16:32 andromeda sshd[17779]: Failed password for invalid user braarvig from 118.24.213.107 port 52392 ssh2
Dec 28 12:25:45 andromeda sshd[18745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.213.107  user=root
2019-12-28 22:10:55
80.15.194.36 attackspambots
firewall-block, port(s): 27015/udp
2019-12-28 22:32:06
107.189.11.160 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-28 22:12:10
123.1.150.73 attackspambots
Unauthorized connection attempt detected from IP address 123.1.150.73 to port 445
2019-12-28 22:04:32
151.14.6.6 attack
Scanning random ports - tries to find possible vulnerable services
2019-12-28 22:32:32

Recently Reported IPs

12.42.131.166 12.38.48.150 115.51.122.143 12.42.131.209
12.43.214.230 12.43.214.62 12.43.214.254 12.43.214.67
12.42.181.77 12.43.214.248 12.42.131.191 12.43.95.116
12.43.95.118 12.42.73.154 115.51.126.172 12.45.3.180
12.45.53.162 12.45.250.230 12.45.77.163 12.45.97.166