Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 153.216.0.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;153.216.0.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 09:37:17 CST 2025
;; MSG SIZE  rcvd: 105
Host info
42.0.216.153.in-addr.arpa domain name pointer p2656042-ipxg00g01fukuokachu.fukuoka.ocn.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.0.216.153.in-addr.arpa	name = p2656042-ipxg00g01fukuokachu.fukuoka.ocn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.200.225.111 attack
1591647893 - 06/08/2020 22:24:53 Host: 190.200.225.111/190.200.225.111 Port: 445 TCP Blocked
2020-06-09 06:21:10
95.168.120.47 attackbots
GET /wp-login.php HTTP/1.1
2020-06-09 06:06:08
178.128.217.58 attackspambots
Jun  8 23:59:26 buvik sshd[31218]: Invalid user paetti from 178.128.217.58
Jun  8 23:59:26 buvik sshd[31218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58
Jun  8 23:59:27 buvik sshd[31218]: Failed password for invalid user paetti from 178.128.217.58 port 43516 ssh2
...
2020-06-09 06:02:01
193.112.191.228 attack
Jun  8 22:56:21 PorscheCustomer sshd[5748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.191.228
Jun  8 22:56:23 PorscheCustomer sshd[5748]: Failed password for invalid user zhangpw from 193.112.191.228 port 57110 ssh2
Jun  8 22:59:54 PorscheCustomer sshd[5825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.191.228
...
2020-06-09 06:24:07
198.71.238.20 attack
198.71.238.20 - - [08/Jun/2020:22:41:36 +0200] "POST /xmlrpc.php HTTP/1.1" 403 1024 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
198.71.238.20 - - [08/Jun/2020:22:41:36 +0200] "POST /xmlrpc.php HTTP/1.1" 403 1024 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
...
2020-06-09 06:22:22
211.104.171.239 attackbots
2020-06-09T00:05:43.295091galaxy.wi.uni-potsdam.de sshd[23456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239  user=sshd
2020-06-09T00:05:44.688781galaxy.wi.uni-potsdam.de sshd[23456]: Failed password for sshd from 211.104.171.239 port 44806 ssh2
2020-06-09T00:06:28.054083galaxy.wi.uni-potsdam.de sshd[23563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239  user=root
2020-06-09T00:06:29.959525galaxy.wi.uni-potsdam.de sshd[23563]: Failed password for root from 211.104.171.239 port 55490 ssh2
2020-06-09T00:07:14.714134galaxy.wi.uni-potsdam.de sshd[23689]: Invalid user cw from 211.104.171.239 port 37938
2020-06-09T00:07:14.715924galaxy.wi.uni-potsdam.de sshd[23689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239
2020-06-09T00:07:14.714134galaxy.wi.uni-potsdam.de sshd[23689]: Invalid user cw from 211.104.171.239 port 3793
...
2020-06-09 06:28:32
188.166.78.16 attackspam
SASL PLAIN auth failed: ruser=...
2020-06-09 06:17:54
157.230.125.207 attackbots
Jun  8 22:22:00 server sshd[17408]: Failed password for root from 157.230.125.207 port 43969 ssh2
Jun  8 22:25:11 server sshd[17693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.125.207
Jun  8 22:25:13 server sshd[17693]: Failed password for invalid user gaowei from 157.230.125.207 port 47678 ssh2
...
2020-06-09 05:56:52
49.235.63.27 attackbots
3014:Jun  8 04:46:37 fmk sshd[18781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.63.27  user=r.r
3015:Jun  8 04:46:39 fmk sshd[18781]: Failed password for r.r from 49.235.63.27 port 55394 ssh2
3016:Jun  8 04:46:40 fmk sshd[18781]: Received disconnect from 49.235.63.27 port 55394:11: Bye Bye [preauth]
3017:Jun  8 04:46:40 fmk sshd[18781]: Disconnected from authenticating user r.r 49.235.63.27 port 55394 [preauth]
3082:Jun  8 05:11:49 fmk sshd[19134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.63.27  user=r.r
3083:Jun  8 05:11:52 fmk sshd[19134]: Failed password for r.r from 49.235.63.27 port 48138 ssh2
3084:Jun  8 05:11:54 fmk sshd[19134]: Received disconnect from 49.235.63.27 port 48138:11: Bye Bye [preauth]
3085:Jun  8 05:11:54 fmk sshd[19134]: Disconnected from authenticating user r.r 49.235.63.27 port 48138 [preauth]
3098:Jun  8 05:15:39 fmk sshd[19193]: pam_unix(ss........
------------------------------
2020-06-09 06:15:44
218.92.0.172 attackspambots
$f2bV_matches
2020-06-09 06:03:41
122.14.47.18 attackspambots
Jun  8 22:24:51 host sshd[14030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.47.18  user=root
Jun  8 22:24:53 host sshd[14030]: Failed password for root from 122.14.47.18 port 17957 ssh2
...
2020-06-09 06:21:56
188.166.117.213 attackbotsspam
2020-06-08 20:01:14,165 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.117.213
2020-06-08 20:39:34,301 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.117.213
2020-06-08 21:15:00,597 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.117.213
2020-06-08 21:51:14,780 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.117.213
2020-06-08 22:24:40,147 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.117.213
...
2020-06-09 06:29:10
49.233.90.66 attackspambots
SSH Invalid Login
2020-06-09 06:27:14
106.13.93.199 attack
Jun  8 17:25:12 ws19vmsma01 sshd[189462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.199
Jun  8 17:25:14 ws19vmsma01 sshd[189462]: Failed password for invalid user ftpuser from 106.13.93.199 port 60230 ssh2
...
2020-06-09 05:58:10
77.42.89.147 attackspam
Unauthorised access (Jun  8) SRC=77.42.89.147 LEN=44 TTL=48 ID=39817 TCP DPT=8080 WINDOW=27775 SYN
2020-06-09 06:34:36

Recently Reported IPs

117.75.111.143 28.12.188.210 52.112.34.94 90.226.120.5
6.240.52.223 240.56.174.249 21.130.130.75 209.187.19.191
57.131.98.221 63.122.228.193 89.37.209.63 92.47.130.26
247.222.212.241 242.234.107.68 18.80.215.47 255.233.221.24
176.147.10.114 101.30.218.100 136.203.39.20 101.150.173.8