Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.240.105.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.240.105.42.			IN	A

;; AUTHORITY SECTION:
.			161	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 08 21:25:20 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 42.105.240.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.105.240.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.50.77.206 attackspam
Attempted Brute Force (cpaneld)
2020-09-13 23:41:51
62.210.130.218 attack
Sep 13 15:12:55 game-panel sshd[13413]: Failed password for root from 62.210.130.218 port 48966 ssh2
Sep 13 15:16:30 game-panel sshd[13562]: Failed password for root from 62.210.130.218 port 38646 ssh2
2020-09-13 23:30:06
81.68.100.138 attackspam
Failed password for root from 81.68.100.138 port 34832 ssh2
2020-09-13 23:55:54
186.154.36.194 attack
Port probing on unauthorized port 9527
2020-09-13 23:54:57
23.129.64.184 attackspam
2020-09-13T16:10[Censored Hostname] sshd[32661]: Failed password for root from 23.129.64.184 port 36145 ssh2
2020-09-13T16:10[Censored Hostname] sshd[32661]: Failed password for root from 23.129.64.184 port 36145 ssh2
2020-09-13T16:11[Censored Hostname] sshd[32661]: Failed password for root from 23.129.64.184 port 36145 ssh2[...]
2020-09-13 23:20:17
92.246.76.251 attackspambots
Sep 13 17:42:15 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=92.246.76.251 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=35432 PROTO=TCP SPT=59920 DPT=50437 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 13 17:43:13 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=92.246.76.251 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=29586 PROTO=TCP SPT=59920 DPT=45427 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 13 17:44:01 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=92.246.76.251 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=23611 PROTO=TCP SPT=59920 DPT=24430 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 13 17:44:19 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=92.246.76.251 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=33860 PROTO=TCP SPT=59920 DPT=26438 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 
...
2020-09-13 23:48:15
54.37.86.192 attackspam
54.37.86.192 (FR/France/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 13 11:07:23 jbs1 sshd[18455]: Failed password for root from 190.128.230.206 port 56828 ssh2
Sep 13 11:07:02 jbs1 sshd[18377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.41.70  user=root
Sep 13 11:07:04 jbs1 sshd[18377]: Failed password for root from 146.0.41.70 port 45848 ssh2
Sep 13 11:08:02 jbs1 sshd[18698]: Failed password for root from 54.37.86.192 port 52728 ssh2
Sep 13 11:08:03 jbs1 sshd[18702]: Failed password for root from 51.79.66.198 port 55338 ssh2

IP Addresses Blocked:

190.128.230.206 (PY/Paraguay/-)
146.0.41.70 (DE/Germany/-)
2020-09-13 23:52:12
180.253.28.239 attackspam
20/9/12@12:55:10: FAIL: Alarm-Network address from=180.253.28.239
20/9/12@12:55:10: FAIL: Alarm-Network address from=180.253.28.239
...
2020-09-13 23:56:18
182.74.25.246 attackbotsspam
Sep 13 15:43:21 ns382633 sshd\[30932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246  user=root
Sep 13 15:43:23 ns382633 sshd\[30932\]: Failed password for root from 182.74.25.246 port 59832 ssh2
Sep 13 15:48:09 ns382633 sshd\[31968\]: Invalid user rstudio from 182.74.25.246 port 13802
Sep 13 15:48:09 ns382633 sshd\[31968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246
Sep 13 15:48:10 ns382633 sshd\[31968\]: Failed password for invalid user rstudio from 182.74.25.246 port 13802 ssh2
2020-09-13 23:15:28
77.247.178.140 attackspam
[2020-09-13 11:08:16] NOTICE[1239][C-00003005] chan_sip.c: Call from '' (77.247.178.140:64933) to extension '011442037693601' rejected because extension not found in context 'public'.
[2020-09-13 11:08:16] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-13T11:08:16.160-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442037693601",SessionID="0x7f4d480d6c18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.178.140/64933",ACLName="no_extension_match"
[2020-09-13 11:09:30] NOTICE[1239][C-00003008] chan_sip.c: Call from '' (77.247.178.140:52206) to extension '011442037693601' rejected because extension not found in context 'public'.
[2020-09-13 11:09:30] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-13T11:09:30.161-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442037693601",SessionID="0x7f4d480961a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
...
2020-09-13 23:31:04
59.148.136.149 attackbots
Time:     Sat Sep 12 12:58:56 2020 -0400
IP:       59.148.136.149 (HK/Hong Kong/059148136149.ctinets.com)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 12 12:58:46 pv-11-ams1 sshd[14736]: Invalid user admin from 59.148.136.149 port 48861
Sep 12 12:58:48 pv-11-ams1 sshd[14736]: Failed password for invalid user admin from 59.148.136.149 port 48861 ssh2
Sep 12 12:58:50 pv-11-ams1 sshd[14740]: Invalid user admin from 59.148.136.149 port 48937
Sep 12 12:58:53 pv-11-ams1 sshd[14740]: Failed password for invalid user admin from 59.148.136.149 port 48937 ssh2
Sep 12 12:58:55 pv-11-ams1 sshd[14743]: Invalid user admin from 59.148.136.149 port 49083
2020-09-13 23:27:40
27.7.170.50 attackbots
Port probing on unauthorized port 23
2020-09-13 23:50:41
40.73.0.147 attackspambots
Sep 13 16:19:04 h2829583 sshd[25018]: Failed password for root from 40.73.0.147 port 37764 ssh2
2020-09-13 23:40:46
222.186.175.169 attack
Sep 13 20:45:49 gw1 sshd[18940]: Failed password for root from 222.186.175.169 port 34704 ssh2
Sep 13 20:46:01 gw1 sshd[18940]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 34704 ssh2 [preauth]
...
2020-09-13 23:46:29
89.248.171.181 attack
Brute forcing email accounts
2020-09-13 23:22:08

Recently Reported IPs

143.27.186.66 32.87.231.201 188.236.93.227 109.247.10.29
188.90.102.209 252.148.193.233 247.85.94.246 29.28.51.162
164.74.70.110 79.2.183.86 25.230.188.59 99.54.205.178
44.129.221.72 95.181.122.245 8.76.253.168 139.42.117.192
211.82.209.154 79.154.200.138 26.198.118.182 207.219.138.32