Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.42.205.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62989
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.42.205.168.			IN	A

;; AUTHORITY SECTION:
.			581	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051401 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 02:12:13 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 168.205.42.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.205.42.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.180 attackspam
SSH Bruteforce attempt
2020-02-19 23:26:44
112.187.5.140 attackspam
23/tcp
[2020-02-19]1pkt
2020-02-19 23:27:49
187.20.61.3 attack
4567/tcp
[2020-02-19]1pkt
2020-02-19 23:57:43
212.21.66.6 attack
(sshd) Failed SSH login from 212.21.66.6 (DE/Germany/tor-exit-4.all.de): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 19 13:36:30 andromeda sshd[28670]: Invalid user abba from 212.21.66.6 port 12846
Feb 19 13:36:32 andromeda sshd[28670]: Failed password for invalid user abba from 212.21.66.6 port 12846 ssh2
Feb 19 13:36:35 andromeda sshd[28670]: Failed password for invalid user abba from 212.21.66.6 port 12846 ssh2
2020-02-19 23:40:29
112.213.105.83 attack
445/tcp
[2020-02-19]1pkt
2020-02-19 23:50:53
80.178.115.146 attackspambots
SSH login attempts brute force.
2020-02-20 00:06:01
118.24.159.78 attack
6379/tcp
[2020-02-19]1pkt
2020-02-19 23:31:03
222.186.30.209 attackbots
Brute-force attempt banned
2020-02-19 23:52:31
122.175.13.99 attackbotsspam
445/tcp
[2020-02-19]1pkt
2020-02-19 23:50:28
46.225.29.32 attack
445/tcp
[2020-02-19]1pkt
2020-02-19 23:41:03
85.196.134.54 attack
Feb 19 14:36:43 MK-Soft-Root1 sshd[24031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.196.134.54 
Feb 19 14:36:45 MK-Soft-Root1 sshd[24031]: Failed password for invalid user wisonadmin from 85.196.134.54 port 37754 ssh2
...
2020-02-19 23:34:56
121.161.100.249 attackbotsspam
Portscan detected
2020-02-19 23:38:54
114.7.162.198 attack
Feb 19 15:40:40 server sshd[1150808]: User www-data from 114.7.162.198 not allowed because not listed in AllowUsers
Feb 19 15:40:43 server sshd[1150808]: Failed password for invalid user www-data from 114.7.162.198 port 55329 ssh2
Feb 19 15:44:11 server sshd[1152816]: Failed password for invalid user minecraft from 114.7.162.198 port 41543 ssh2
2020-02-19 23:42:04
92.27.207.208 attack
8080/tcp
[2020-02-19]1pkt
2020-02-19 23:49:32
92.118.38.57 attack
Feb 19 15:43:36 mail postfix/smtpd\[31037\]: warning: unknown\[92.118.38.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 19 15:44:07 mail postfix/smtpd\[31037\]: warning: unknown\[92.118.38.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 19 15:44:38 mail postfix/smtpd\[31040\]: warning: unknown\[92.118.38.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 19 16:14:55 mail postfix/smtpd\[31624\]: warning: unknown\[92.118.38.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-02-19 23:32:21

Recently Reported IPs

62.112.195.53 70.102.223.31 164.26.124.252 218.81.245.185
172.18.0.1 179.188.7.115 116.107.241.60 202.21.107.120
81.21.82.91 177.153.11.7 184.22.161.62 95.85.68.144
202.52.248.155 154.121.20.26 117.65.228.243 151.248.112.251
48.167.136.236 110.78.179.90 150.107.246.244 160.153.234.73