Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbia

Region: South Carolina

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.42.231.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.42.231.105.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010400 1800 900 604800 86400

;; Query time: 197 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 04 18:10:29 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 105.231.42.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.231.42.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
220.129.152.47 attack
37215/tcp
[2019-06-30]1pkt
2019-07-01 06:41:07
185.244.25.184 attack
ZTE Router Exploit Scanner
2019-07-01 07:03:34
177.92.245.161 attackbotsspam
SASL PLAIN auth failed: ruser=...
2019-07-01 06:42:21
139.99.124.167 attackspambots
MYH,DEF GET /wp-login.php
2019-07-01 07:07:21
201.150.88.203 attackbots
Brute force attack stopped by firewall
2019-07-01 07:05:03
185.137.111.188 attack
Jul  1 00:25:36 mail postfix/smtpd\[23250\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  1 00:56:04 mail postfix/smtpd\[23671\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  1 00:56:46 mail postfix/smtpd\[23671\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  1 00:57:26 mail postfix/smtpd\[23671\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-07-01 07:13:18
195.62.53.79 attackbots
SQL Injection Exploit Attempts
2019-07-01 06:57:29
189.90.210.39 attack
Brute force attack stopped by firewall
2019-07-01 07:18:26
154.113.89.186 attackbots
[connect count:4 time(s)][SMTP/25/465/587 Probe]

in SpamCop:"listed"
in sorbs:"listed [spam]"
in Unsubscore:"listed"
*(06301539)
2019-07-01 06:43:17
1.6.114.75 attackspam
2019-06-30T18:15:42.468449centos sshd\[13040\]: Invalid user server from 1.6.114.75 port 58134
2019-06-30T18:15:42.474370centos sshd\[13040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.6.114.75
2019-06-30T18:15:44.769198centos sshd\[13040\]: Failed password for invalid user server from 1.6.114.75 port 58134 ssh2
2019-07-01 06:57:04
168.228.149.10 attack
Brute force attack stopped by firewall
2019-07-01 07:06:45
14.163.127.36 attack
[connect count:2 time(s)][SMTP/25/465/587 Probe]

in sorbs:"listed [spam]"
in Unsubscore:"listed"
*(06301538)
2019-07-01 06:54:27
201.150.88.215 attackbots
Brute force attack stopped by firewall
2019-07-01 07:12:38
138.99.52.36 attackbots
[connect count:4 time(s)][SMTP/25/465/587 Probe]

in SpamCop:"listed"
in sorbs:"listed [spam]"
in Unsubscore:"listed"
*(06301539)
2019-07-01 06:35:51
201.150.88.119 attackbotsspam
[SMTP/25/465/587 Probe]

*(06301539)
2019-07-01 06:34:43

Recently Reported IPs

120.184.96.159 224.195.201.145 119.102.75.99 118.90.154.67
118.44.253.46 117.8.175.26 117.211.157.14 117.240.137.106
116.203.194.117 116.129.177.153 115.126.211.214 114.34.148.124
114.201.159.212 113.33.45.228 112.84.61.21 112.190.101.69
112.134.155.104 112.126.130.119 112.112.156.124 111.40.82.43