Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.223.22.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.223.22.42.			IN	A

;; AUTHORITY SECTION:
.			403	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 16:06:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.22.223.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.22.223.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.22.45.165 attackbotsspam
08/12/2019-14:33:36.008152 81.22.45.165 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 86
2019-08-13 02:54:44
58.153.51.174 attack
ssh failed login
2019-08-13 02:25:16
2001:e68:4429:46c7:5c07:2734:9b71:871a attack
C1,WP GET /wp-login.php
2019-08-13 03:02:33
83.165.211.178 attackbots
Aug 12 20:08:26 * sshd[12850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.165.211.178
Aug 12 20:08:28 * sshd[12850]: Failed password for invalid user stack from 83.165.211.178 port 55826 ssh2
2019-08-13 03:03:31
45.67.14.151 attackbotsspam
Aug 12 15:50:05 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=45.67.14.151 DST=172.31.1.100 LEN=44 TOS=0x00 PREC=0x00 TTL=247 ID=10911 PROTO=TCP SPT=58529 DPT=3333 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-13 02:46:04
62.4.21.142 attack
Aug 12 15:43:52 srv-4 sshd\[30638\]: Invalid user tempo from 62.4.21.142
Aug 12 15:43:52 srv-4 sshd\[30638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.21.142
Aug 12 15:43:54 srv-4 sshd\[30638\]: Failed password for invalid user tempo from 62.4.21.142 port 37340 ssh2
...
2019-08-13 02:35:22
142.93.1.100 attackspambots
Aug 12 13:58:14 microserver sshd[4171]: Invalid user ben from 142.93.1.100 port 33702
Aug 12 13:58:14 microserver sshd[4171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100
Aug 12 13:58:16 microserver sshd[4171]: Failed password for invalid user ben from 142.93.1.100 port 33702 ssh2
Aug 12 14:03:13 microserver sshd[4819]: Invalid user demo from 142.93.1.100 port 54176
Aug 12 14:03:13 microserver sshd[4819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100
Aug 12 14:18:45 microserver sshd[6778]: Invalid user nestor from 142.93.1.100 port 59766
Aug 12 14:18:45 microserver sshd[6778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100
Aug 12 14:18:47 microserver sshd[6778]: Failed password for invalid user nestor from 142.93.1.100 port 59766 ssh2
Aug 12 14:23:56 microserver sshd[7448]: Invalid user mario from 142.93.1.100 port 52460
Aug 12 14:23:56 microserve
2019-08-13 02:44:02
95.167.78.26 attack
40428/tcp 41850/tcp 40958/tcp...
[2019-07-14/08-12]78pkt,75pt.(tcp)
2019-08-13 03:06:29
107.170.202.131 attackbots
28021/tcp 44471/tcp 27017/tcp...
[2019-06-13/08-12]66pkt,52pt.(tcp),6pt.(udp)
2019-08-13 03:07:16
167.99.38.73 attack
Tried sshing with brute force.
2019-08-13 02:50:41
162.243.149.252 attackbots
20/tcp 25877/tcp 5351/udp...
[2019-06-12/08-11]79pkt,63pt.(tcp),3pt.(udp)
2019-08-13 02:44:28
191.96.41.92 attackspam
Bad bot/spoofed identity
2019-08-13 02:58:28
162.243.150.172 attackbotsspam
465/tcp 2096/tcp 61038/tcp...
[2019-06-13/08-12]66pkt,52pt.(tcp),6pt.(udp)
2019-08-13 02:45:12
185.159.32.15 attackspam
$f2bV_matches_ltvn
2019-08-13 03:06:45
92.53.65.96 attackspam
08/12/2019-14:22:16.619186 92.53.65.96 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-13 02:56:14

Recently Reported IPs

152.48.21.255 146.5.135.74 253.57.11.234 153.89.146.156
115.73.185.189 174.83.243.249 215.94.211.65 136.21.86.206
64.223.145.141 151.71.65.242 116.250.212.19 119.10.173.14
138.244.44.60 166.73.41.33 120.141.66.252 121.169.208.63
125.51.234.151 130.22.1.98 149.11.114.57 178.218.31.225