Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.124.242.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.124.242.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 156 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 05:28:45 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 42.242.124.143.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 143.124.242.42.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
75.157.110.192 attackbots
Automated report (2020-04-21T10:59:09+00:00). Faked user agent detected.
2020-04-21 19:54:03
77.40.27.26 attackspam
18 packets to ports 465 587
2020-04-21 19:55:04
40.76.46.40 attackbots
" "
2020-04-21 19:30:31
113.240.237.10 attack
CMS (WordPress or Joomla) login attempt.
2020-04-21 19:25:21
51.255.215.177 attackbotsspam
Bruteforce detected by fail2ban
2020-04-21 19:39:38
51.91.56.130 attack
(sshd) Failed SSH login from 51.91.56.130 (FR/France/vps02.amaze.gr): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 21 11:43:51 ubnt-55d23 sshd[25838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.56.130  user=root
Apr 21 11:43:52 ubnt-55d23 sshd[25838]: Failed password for root from 51.91.56.130 port 59236 ssh2
2020-04-21 19:31:28
61.53.9.197 attackspambots
(ftpd) Failed FTP login from 61.53.9.197 (CN/China/hn.kd.dhcp): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 21 15:01:35 ir1 pure-ftpd: (?@61.53.9.197) [WARNING] Authentication failed for user [anonymous]
2020-04-21 19:30:17
14.165.101.0 attackspambots
prod3
...
2020-04-21 19:43:47
194.61.24.47 attack
firewall-block, port(s): 3386/tcp, 3389/tcp
2020-04-21 19:15:19
45.83.118.106 attack
[2020-04-21 06:56:16] NOTICE[1170][C-000031b0] chan_sip.c: Call from '' (45.83.118.106:50590) to extension '46842002315' rejected because extension not found in context 'public'.
[2020-04-21 06:56:16] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-21T06:56:16.259-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46842002315",SessionID="0x7f6c082b17a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.83.118.106/50590",ACLName="no_extension_match"
[2020-04-21 06:59:11] NOTICE[1170][C-000031b5] chan_sip.c: Call from '' (45.83.118.106:56243) to extension '01146842002315' rejected because extension not found in context 'public'.
[2020-04-21 06:59:11] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-21T06:59:11.159-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146842002315",SessionID="0x7f6c08341c08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.83.118.
...
2020-04-21 19:17:58
77.40.28.131 attackbots
(smtpauth) Failed SMTP AUTH login from 77.40.28.131 (RU/Russia/131.28.pppoe.mari-el.ru): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-21 08:18:34 login authenticator failed for (localhost.localdomain) [77.40.28.131]: 535 Incorrect authentication data (set_id=fsh@safanicu.com)
2020-04-21 19:35:49
129.146.69.238 attack
Invalid user bot from 129.146.69.238 port 47864
2020-04-21 19:17:04
218.92.0.207 attack
Bruteforce detected by fail2ban
2020-04-21 19:24:17
90.143.149.102 attackbotsspam
Hits on port : 445
2020-04-21 19:17:42
144.217.70.190 attackspambots
Automatic report - XMLRPC Attack
2020-04-21 19:32:24

Recently Reported IPs

140.64.19.19 163.95.74.46 230.193.56.107 196.56.255.85
159.241.176.47 85.76.115.189 86.54.121.4 124.82.165.26
145.80.35.61 152.81.136.136 69.178.211.70 242.129.125.107
6.0.68.103 141.140.84.118 13.93.246.233 164.100.251.239
99.214.26.177 40.206.203.36 124.116.206.42 155.229.21.100