Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: Telstra

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.154.8.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54154
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;120.154.8.42.			IN	A

;; AUTHORITY SECTION:
.			480	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071901 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jul 20 08:53:14 CST 2020
;; MSG SIZE  rcvd: 116
Host info
42.8.154.120.in-addr.arpa domain name pointer cpe-120-154-8-42.nb06.nsw.asp.telstra.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.8.154.120.in-addr.arpa	name = cpe-120-154-8-42.nb06.nsw.asp.telstra.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.240.205.34 attackbots
Port scan: Attack repeated for 24 hours
2020-02-11 03:49:38
116.104.186.30 attack
02/10/2020-08:37:54.344650 116.104.186.30 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-11 03:37:27
217.78.1.59 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-11 03:47:14
217.113.14.127 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-11 03:44:08
211.152.144.95 attackspam
ICMP MH Probe, Scan /Distributed -
2020-02-11 03:31:29
206.246.8.216 attackspam
Automatic report - Port Scan Attack
2020-02-11 03:47:31
187.188.91.106 attack
Honeypot attack, port: 445, PTR: fixed-187-188-91-106.totalplay.net.
2020-02-11 03:54:05
112.85.42.232 attackbots
Feb 10 19:42:25 mail sshd\[20357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Feb 10 19:42:27 mail sshd\[20357\]: Failed password for root from 112.85.42.232 port 30401 ssh2
Feb 10 19:43:38 mail sshd\[20366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
...
2020-02-11 03:40:21
104.238.99.130 attack
10 attempts against mh-misc-ban on leaf
2020-02-11 03:59:18
170.150.218.203 attackbotsspam
Automatic report - Port Scan Attack
2020-02-11 03:39:59
202.131.237.182 attackspambots
$f2bV_matches
2020-02-11 04:09:58
35.188.242.129 attack
Feb 10 19:51:51 ourumov-web sshd\[15343\]: Invalid user wje from 35.188.242.129 port 60748
Feb 10 19:51:51 ourumov-web sshd\[15343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.242.129
Feb 10 19:51:54 ourumov-web sshd\[15343\]: Failed password for invalid user wje from 35.188.242.129 port 60748 ssh2
...
2020-02-11 03:59:50
121.160.178.18 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-11 03:41:43
220.125.148.199 attackspambots
Invalid user mfb from 220.125.148.199 port 56538
2020-02-11 03:38:35
106.13.216.134 attack
Feb 10 05:48:02 web1 sshd\[20586\]: Invalid user mjq from 106.13.216.134
Feb 10 05:48:02 web1 sshd\[20586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.216.134
Feb 10 05:48:05 web1 sshd\[20586\]: Failed password for invalid user mjq from 106.13.216.134 port 52358 ssh2
Feb 10 05:53:04 web1 sshd\[21040\]: Invalid user scu from 106.13.216.134
Feb 10 05:53:04 web1 sshd\[21040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.216.134
2020-02-11 03:30:23

Recently Reported IPs

88.171.191.117 196.70.74.57 101.255.139.131 195.45.82.112
222.185.190.125 108.170.123.34 77.18.239.253 145.60.3.247
177.53.46.193 180.146.209.6 84.147.243.30 107.130.176.210
210.131.178.247 68.203.98.151 189.220.15.169 175.87.91.190
190.250.28.71 59.10.186.119 89.11.134.13 171.11.190.17