Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.212.42.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.212.42.100.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 06 16:50:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 100.42.212.136.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 136.212.42.100.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
27.155.41.8 attackbots
Automatic report - Port Scan Attack
2020-09-05 08:48:20
121.122.40.109 attack
SSH Invalid Login
2020-09-05 08:57:10
182.56.107.237 attackbotsspam
Invalid user vagner from 182.56.107.237 port 55718
2020-09-05 08:56:34
222.186.175.167 attackbotsspam
Sep  4 21:18:03 dignus sshd[977]: Failed password for root from 222.186.175.167 port 1048 ssh2
Sep  4 21:18:07 dignus sshd[977]: Failed password for root from 222.186.175.167 port 1048 ssh2
Sep  4 21:18:28 dignus sshd[1120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Sep  4 21:18:30 dignus sshd[1120]: Failed password for root from 222.186.175.167 port 58474 ssh2
Sep  4 21:18:34 dignus sshd[1120]: Failed password for root from 222.186.175.167 port 58474 ssh2
...
2020-09-05 12:25:56
192.241.220.130 attackspambots
Tried to find non-existing directory/file on the server
2020-09-05 08:51:57
167.71.72.70 attackspam
bruteforce detected
2020-09-05 09:02:21
192.241.226.136 attackbotsspam
Port Scan
...
2020-09-05 08:53:42
45.129.33.4 attack
Port-scan: detected 101 distinct ports within a 24-hour window.
2020-09-05 08:31:40
190.37.233.232 attack
Honeypot attack, port: 445, PTR: 190-37-233-232.dyn.dsl.cantv.net.
2020-09-05 08:33:49
130.105.53.209 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 08:37:34
151.80.149.75 attackspam
B: Abusive ssh attack
2020-09-05 08:43:05
52.231.177.18 attackbots
Port scan on 11 port(s): 3 22 146 311 464 500 544 563 777 888 912
2020-09-05 08:53:23
193.228.91.123 attackbots
Sep  5 02:07:57 vm1 sshd[20435]: Failed password for root from 193.228.91.123 port 33416 ssh2
...
2020-09-05 08:39:00
192.241.224.140 attackspambots
192.241.224.140 - - [04/Sep/2020:12:48:33 -0400] "GET /owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f HTTP/1.1" 444 0 "-" "Mozilla/5.0 zgrab/0.x"
...
2020-09-05 09:01:31
1.180.230.98 attackbots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-09-05 09:00:10

Recently Reported IPs

143.69.97.111 239.253.190.63 19.3.113.173 94.170.22.107
88.159.124.81 39.225.232.142 123.102.60.56 190.166.237.7
74.32.251.172 3.20.209.40 83.185.188.168 39.171.17.3
73.217.239.181 44.97.204.240 149.91.47.178 27.174.167.145
26.199.37.19 90.236.172.117 229.6.3.31 178.175.116.30