Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boston

Region: Massachusetts

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.121.42.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.121.42.198.			IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103101 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 13:12:00 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 198.42.121.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 198.42.121.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
83.228.97.22 attackspam
Honeypot attack, port: 445, PTR: 83-228-97-22.btc-net.bg.
2020-02-02 04:08:24
192.163.224.116 attackbots
(sshd) Failed SSH login from 192.163.224.116 (US/United States/server.biocuckoo.org): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb  1 21:55:45 s1 sshd[21171]: Invalid user admin from 192.163.224.116 port 45048
Feb  1 21:55:47 s1 sshd[21171]: Failed password for invalid user admin from 192.163.224.116 port 45048 ssh2
Feb  1 21:59:33 s1 sshd[21298]: Invalid user steam from 192.163.224.116 port 42142
Feb  1 21:59:34 s1 sshd[21298]: Failed password for invalid user steam from 192.163.224.116 port 42142 ssh2
Feb  1 22:00:47 s1 sshd[21366]: Invalid user ubuntu from 192.163.224.116 port 54962
2020-02-02 04:02:54
142.44.160.173 attackbotsspam
...
2020-02-02 04:26:08
14.29.240.171 attack
Unauthorized connection attempt detected from IP address 14.29.240.171 to port 2220 [J]
2020-02-02 04:07:52
94.156.174.15 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/94.156.174.15/ 
 
 BG - 1H : (5)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BG 
 NAME ASN : ASN44901 
 
 IP : 94.156.174.15 
 
 CIDR : 94.156.174.0/24 
 
 PREFIX COUNT : 60 
 
 UNIQUE IP COUNT : 15360 
 
 
 ATTACKS DETECTED ASN44901 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-02-01 14:33:51 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-02-02 04:15:41
122.238.129.61 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 04:23:09
106.75.47.137 attack
Unauthorized connection attempt detected from IP address 106.75.47.137 to port 22 [T]
2020-02-02 04:10:58
84.17.46.21 attackbotsspam
(From jayroach@hotmail.co.uk) Аdult onlinе dаting phоnе numbers: http://ypvijdc.tajmahalblacktea.com/6
2020-02-02 03:58:06
142.44.240.12 attack
Feb  1 21:41:10 server sshd\[2045\]: Invalid user oracle from 142.44.240.12
Feb  1 21:41:10 server sshd\[2045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=irc.zonenet.org 
Feb  1 21:41:12 server sshd\[2045\]: Failed password for invalid user oracle from 142.44.240.12 port 34514 ssh2
Feb  1 21:58:11 server sshd\[5949\]: Invalid user hadoop from 142.44.240.12
Feb  1 21:58:11 server sshd\[5949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=irc.zonenet.org 
...
2020-02-02 04:18:53
106.124.131.194 attack
Unauthorized connection attempt detected from IP address 106.124.131.194 to port 2220 [J]
2020-02-02 03:57:42
211.199.85.158 attackbotsspam
Feb  1 18:32:49 grey postfix/smtpd\[30628\]: NOQUEUE: reject: RCPT from unknown\[211.199.85.158\]: 554 5.7.1 Service unavailable\; Client host \[211.199.85.158\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[211.199.85.158\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-02 04:20:49
142.44.184.79 attackbots
...
2020-02-02 04:20:08
142.4.3.21 attackbots
...
2020-02-02 04:29:58
45.192.165.214 attackbots
Unauthorized connection attempt detected from IP address 45.192.165.214 to port 80 [J]
2020-02-02 04:08:48
139.162.72.202 attack
Honeypot attack, port: 445, PTR: li1552-202.members.linode.com.
2020-02-02 04:13:32

Recently Reported IPs

11.43.255.153 188.85.61.238 153.163.161.211 188.220.140.90
173.245.194.240 54.75.85.176 152.149.56.161 100.68.18.145
17.48.120.69 189.219.237.131 103.28.164.24 74.24.37.16
248.252.210.155 234.228.140.67 183.119.51.230 101.32.27.120
168.181.150.7 193.250.178.202 221.228.78.222 198.35.33.9