Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.142.42.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.142.42.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 12:22:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 244.42.142.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.42.142.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.84.174.215 attackspam
Sep 30 07:37:05 server sshd[8608]: Failed password for invalid user rsync from 186.84.174.215 port 10369 ssh2
Sep 30 07:57:10 server sshd[13165]: Failed password for invalid user dcc from 186.84.174.215 port 19073 ssh2
Sep 30 08:01:34 server sshd[14194]: Failed password for invalid user tss from 186.84.174.215 port 34849 ssh2
2019-09-30 14:32:14
54.38.81.106 attackbots
Sep 30 08:10:26 ns3110291 sshd\[32262\]: Invalid user atscale from 54.38.81.106
Sep 30 08:10:29 ns3110291 sshd\[32262\]: Failed password for invalid user atscale from 54.38.81.106 port 56836 ssh2
Sep 30 08:14:16 ns3110291 sshd\[32406\]: Invalid user hz from 54.38.81.106
Sep 30 08:14:18 ns3110291 sshd\[32406\]: Failed password for invalid user hz from 54.38.81.106 port 41414 ssh2
Sep 30 08:18:05 ns3110291 sshd\[32650\]: Invalid user midha from 54.38.81.106
...
2019-09-30 14:59:48
93.174.89.53 attackspam
Postfix Brute-Force reported by Fail2Ban
2019-09-30 14:45:05
95.85.60.251 attackspambots
Sep 29 20:26:50 hpm sshd\[13118\]: Invalid user eric from 95.85.60.251
Sep 29 20:26:50 hpm sshd\[13118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251
Sep 29 20:26:53 hpm sshd\[13118\]: Failed password for invalid user eric from 95.85.60.251 port 33242 ssh2
Sep 29 20:31:58 hpm sshd\[13536\]: Invalid user rl from 95.85.60.251
Sep 29 20:31:58 hpm sshd\[13536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251
2019-09-30 14:47:37
188.131.145.52 attackbotsspam
Sep 29 20:18:02 web1 sshd\[16967\]: Invalid user trendimsa1.0 from 188.131.145.52
Sep 29 20:18:02 web1 sshd\[16967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.145.52
Sep 29 20:18:04 web1 sshd\[16967\]: Failed password for invalid user trendimsa1.0 from 188.131.145.52 port 59160 ssh2
Sep 29 20:21:52 web1 sshd\[17249\]: Invalid user user from 188.131.145.52
Sep 29 20:21:52 web1 sshd\[17249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.145.52
2019-09-30 14:30:21
217.65.27.132 attackspambots
Sep 30 08:00:01 [host] sshd[19843]: Invalid user efms from 217.65.27.132
Sep 30 08:00:01 [host] sshd[19843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.65.27.132
Sep 30 08:00:03 [host] sshd[19843]: Failed password for invalid user efms from 217.65.27.132 port 50530 ssh2
2019-09-30 15:00:22
222.186.31.144 attack
Sep 30 08:43:20 minden010 sshd[2415]: Failed password for root from 222.186.31.144 port 43404 ssh2
Sep 30 08:43:22 minden010 sshd[2415]: Failed password for root from 222.186.31.144 port 43404 ssh2
Sep 30 08:43:24 minden010 sshd[2415]: Failed password for root from 222.186.31.144 port 43404 ssh2
...
2019-09-30 14:51:20
31.185.104.21 attack
Sep 30 03:56:32 thevastnessof sshd[23137]: Failed password for root from 31.185.104.21 port 34967 ssh2
...
2019-09-30 14:38:38
77.247.110.197 attackbots
\[2019-09-30 02:51:56\] NOTICE\[1948\] chan_sip.c: Registration from '\' failed for '77.247.110.197:55370' - Wrong password
\[2019-09-30 02:51:56\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-30T02:51:56.124-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="6039",SessionID="0x7f1e1c501638",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.197/55370",Challenge="1fd9f47e",ReceivedChallenge="1fd9f47e",ReceivedHash="227264c94b0ab9fd2944ba62082c2c1a"
\[2019-09-30 02:51:56\] NOTICE\[1948\] chan_sip.c: Registration from '\' failed for '77.247.110.197:55369' - Wrong password
\[2019-09-30 02:51:56\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-30T02:51:56.150-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="6039",SessionID="0x7f1e1d0dc8e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.197/55369",Chal
2019-09-30 15:05:23
150.165.98.39 attackspambots
Sep 30 06:25:18 hcbbdb sshd\[21845\]: Invalid user vf from 150.165.98.39
Sep 30 06:25:18 hcbbdb sshd\[21845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.165.98.39
Sep 30 06:25:20 hcbbdb sshd\[21845\]: Failed password for invalid user vf from 150.165.98.39 port 41180 ssh2
Sep 30 06:30:09 hcbbdb sshd\[23116\]: Invalid user guest from 150.165.98.39
Sep 30 06:30:09 hcbbdb sshd\[23116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.165.98.39
2019-09-30 14:34:28
95.84.128.25 attackspambots
proto=tcp  .  spt=42707  .  dpt=25  .     (Found on   Dark List de Sep 30)     (311)
2019-09-30 14:27:11
101.89.147.85 attackspambots
Sep 29 20:28:17 sachi sshd\[5595\]: Invalid user diu from 101.89.147.85
Sep 29 20:28:17 sachi sshd\[5595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.147.85
Sep 29 20:28:19 sachi sshd\[5595\]: Failed password for invalid user diu from 101.89.147.85 port 58513 ssh2
Sep 29 20:32:21 sachi sshd\[5954\]: Invalid user oracle from 101.89.147.85
Sep 29 20:32:21 sachi sshd\[5954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.147.85
2019-09-30 14:39:40
49.234.86.229 attackbotsspam
Automatic report - Banned IP Access
2019-09-30 15:08:55
195.140.227.93 attack
Sep 30 06:48:37 hcbbdb sshd\[25181\]: Invalid user takim from 195.140.227.93
Sep 30 06:48:37 hcbbdb sshd\[25181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.140.227.93
Sep 30 06:48:39 hcbbdb sshd\[25181\]: Failed password for invalid user takim from 195.140.227.93 port 43342 ssh2
Sep 30 06:54:06 hcbbdb sshd\[25802\]: Invalid user rescue from 195.140.227.93
Sep 30 06:54:06 hcbbdb sshd\[25802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.140.227.93
2019-09-30 15:01:46
196.190.28.52 attackspambots
445/tcp
[2019-09-30]1pkt
2019-09-30 14:27:37

Recently Reported IPs

94.97.46.140 19.37.165.98 127.168.119.164 166.150.222.94
236.101.253.86 110.251.177.116 249.102.67.203 26.148.199.160
94.87.231.8 160.14.204.97 70.176.243.19 185.22.32.105
221.37.48.195 86.160.224.86 84.197.164.25 240.9.94.150
101.146.191.9 44.5.214.247 227.89.73.33 231.71.196.67