Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.65.23.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.65.23.42.			IN	A

;; AUTHORITY SECTION:
.			109	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 19:15:15 CST 2022
;; MSG SIZE  rcvd: 105
Host info
42.23.65.157.in-addr.arpa domain name pointer svs3.c-shop.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.23.65.157.in-addr.arpa	name = svs3.c-shop.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.163.57.102 attackspambots
Port scan on 1 port(s): 445
2020-08-24 21:48:20
190.199.33.226 attackspambots
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-24 21:45:02
139.59.154.31 attackspambots
Attempted connection to port 80.
2020-08-24 21:21:34
111.229.254.17 attackspam
2020-08-24T12:43:21.221574shield sshd\[8169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.254.17  user=root
2020-08-24T12:43:23.666254shield sshd\[8169\]: Failed password for root from 111.229.254.17 port 44968 ssh2
2020-08-24T12:46:33.755305shield sshd\[8680\]: Invalid user ym from 111.229.254.17 port 46590
2020-08-24T12:46:33.775549shield sshd\[8680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.254.17
2020-08-24T12:46:35.909044shield sshd\[8680\]: Failed password for invalid user ym from 111.229.254.17 port 46590 ssh2
2020-08-24 21:39:22
51.38.188.20 attackspambots
Invalid user support from 51.38.188.20 port 58908
2020-08-24 21:52:39
175.7.196.228 attackspam
Lines containing failures of 175.7.196.228
Aug 24 06:10:42 penfold sshd[16322]: Invalid user eon from 175.7.196.228 port 36710
Aug 24 06:10:42 penfold sshd[16322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.7.196.228 
Aug 24 06:10:44 penfold sshd[16322]: Failed password for invalid user eon from 175.7.196.228 port 36710 ssh2
Aug 24 06:10:45 penfold sshd[16322]: Received disconnect from 175.7.196.228 port 36710:11: Bye Bye [preauth]
Aug 24 06:10:45 penfold sshd[16322]: Disconnected from invalid user eon 175.7.196.228 port 36710 [preauth]
Aug 24 06:25:47 penfold sshd[17959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.7.196.228  user=r.r
Aug 24 06:25:49 penfold sshd[17959]: Failed password for r.r from 175.7.196.228 port 43320 ssh2
Aug 24 06:25:50 penfold sshd[17959]: Received disconnect from 175.7.196.228 port 43320:11: Bye Bye [preauth]
Aug 24 06:25:50 penfold sshd[17959]: Di........
------------------------------
2020-08-24 21:53:11
61.144.20.193 attackbots
Port Scan detected!
...
2020-08-24 21:58:54
14.177.6.177 attack
Attempted connection to port 445.
2020-08-24 21:20:59
138.36.100.81 attackspambots
Automatic report - XMLRPC Attack
2020-08-24 21:19:19
165.22.104.67 attackbotsspam
Failed password for invalid user stage from 165.22.104.67 port 37582 ssh2
2020-08-24 21:53:27
87.251.74.3 attack
Port scan: Attack repeated for 24 hours
2020-08-24 21:35:42
161.47.70.199 attack
161.47.70.199 - - [24/Aug/2020:14:26:19 +0100] "POST /wp-login.php HTTP/1.1" 200 1949 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.47.70.199 - - [24/Aug/2020:14:26:22 +0100] "POST /wp-login.php HTTP/1.1" 200 1994 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.47.70.199 - - [24/Aug/2020:14:26:23 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-24 22:02:16
66.96.235.110 attack
Aug 24 15:08:45 pkdns2 sshd\[8201\]: Invalid user dgu from 66.96.235.110Aug 24 15:08:46 pkdns2 sshd\[8201\]: Failed password for invalid user dgu from 66.96.235.110 port 51622 ssh2Aug 24 15:10:46 pkdns2 sshd\[8331\]: Failed password for root from 66.96.235.110 port 54600 ssh2Aug 24 15:12:43 pkdns2 sshd\[8426\]: Invalid user stacy from 66.96.235.110Aug 24 15:12:45 pkdns2 sshd\[8426\]: Failed password for invalid user stacy from 66.96.235.110 port 57582 ssh2Aug 24 15:14:34 pkdns2 sshd\[8514\]: Invalid user lxb from 66.96.235.110
...
2020-08-24 21:52:12
47.104.85.14 attackspam
47.104.85.14 - - [24/Aug/2020:12:51:34 +0100] "POST /wp-login.php HTTP/1.1" 200 4433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
47.104.85.14 - - [24/Aug/2020:12:51:38 +0100] "POST /wp-login.php HTTP/1.1" 200 4433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
47.104.85.14 - - [24/Aug/2020:12:51:40 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-24 22:00:09
51.75.30.238 attackbots
2020-08-24T20:06:24.227862hostname sshd[16962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=238.ip-51-75-30.eu
2020-08-24T20:06:24.207442hostname sshd[16962]: Invalid user snq from 51.75.30.238 port 59840
2020-08-24T20:06:26.203613hostname sshd[16962]: Failed password for invalid user snq from 51.75.30.238 port 59840 ssh2
...
2020-08-24 21:30:45

Recently Reported IPs

157.7.107.106 157.7.107.109 157.7.107.111 157.7.107.112
157.7.107.110 157.7.107.107 157.7.107.126 157.7.107.125
157.7.107.123 157.7.107.128 157.7.107.113 157.7.107.120
157.7.107.132 157.7.107.131 157.7.107.136 157.7.107.137
157.7.107.134 157.7.107.138 157.7.107.141 157.7.107.147