Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.59.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.59.42.			IN	A

;; AUTHORITY SECTION:
.			73	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 21:20:42 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 42.59.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.59.18.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.231.2 attackspambots
May 15 05:55:49 scw-6657dc sshd[13592]: Failed password for root from 159.89.231.2 port 52694 ssh2
May 15 05:55:49 scw-6657dc sshd[13592]: Failed password for root from 159.89.231.2 port 52694 ssh2
May 15 05:59:43 scw-6657dc sshd[13708]: Invalid user alysia from 159.89.231.2 port 34542
...
2020-05-15 14:38:33
119.204.100.197 attack
Port probing on unauthorized port 8080
2020-05-15 15:19:07
151.80.34.219 attackbotsspam
Attempts to probe for or exploit a Drupal 7.69 site on url: /phpmyadmin/scripts/setup.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2020-05-15 15:08:09
66.181.166.152 attackbotsspam
20/5/14@23:54:08: FAIL: Alarm-Network address from=66.181.166.152
...
2020-05-15 15:20:28
62.210.90.227 attackbots
Invalid user teamspeak from 62.210.90.227 port 60186
2020-05-15 15:21:49
45.148.124.236 attackspambots
Chat Spam
2020-05-15 14:50:59
203.172.66.216 attackbots
Invalid user deploy from 203.172.66.216 port 57628
2020-05-15 15:02:28
159.65.228.82 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2020-05-15 15:05:57
119.130.114.246 attackbotsspam
Port probing on unauthorized port 445
2020-05-15 14:47:46
167.99.66.158 attackbots
2020-05-15T08:06:31.769570rocketchat.forhosting.nl sshd[2095]: Invalid user oracle from 167.99.66.158 port 48508
2020-05-15T08:06:34.114109rocketchat.forhosting.nl sshd[2095]: Failed password for invalid user oracle from 167.99.66.158 port 48508 ssh2
2020-05-15T08:11:03.351111rocketchat.forhosting.nl sshd[2153]: Invalid user osboxes from 167.99.66.158 port 57598
...
2020-05-15 14:35:12
222.186.180.17 attackspam
May 15 07:52:55 combo sshd[27708]: Failed password for root from 222.186.180.17 port 54702 ssh2
May 15 07:52:59 combo sshd[27708]: Failed password for root from 222.186.180.17 port 54702 ssh2
May 15 07:53:04 combo sshd[27708]: Failed password for root from 222.186.180.17 port 54702 ssh2
...
2020-05-15 15:01:16
157.245.194.35 attackbots
$f2bV_matches
2020-05-15 14:53:47
180.168.95.234 attack
May 15 06:06:32 ns3033917 sshd[5476]: Invalid user q1w2e3 from 180.168.95.234 port 46848
May 15 06:06:34 ns3033917 sshd[5476]: Failed password for invalid user q1w2e3 from 180.168.95.234 port 46848 ssh2
May 15 06:19:02 ns3033917 sshd[5657]: Invalid user kettle from 180.168.95.234 port 55296
...
2020-05-15 14:41:23
31.43.124.15 attackspambots
port scan and connect, tcp 8080 (http-proxy)
2020-05-15 14:52:21
35.200.168.65 attackbots
Invalid user shiny from 35.200.168.65 port 34762
2020-05-15 15:00:41

Recently Reported IPs

243.211.102.153 23.229.119.242 149.18.58.96 186.179.23.39
23.229.119.112 139.177.195.93 114.220.77.36 128.90.115.200
174.76.5.211 128.90.145.69 186.125.221.158 124.227.86.59
60.167.56.188 64.253.86.183 61.178.183.125 128.90.205.70
128.90.206.66 113.140.212.45 178.46.181.226 172.105.87.12