Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.228.42.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.228.42.42.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 08 17:48:46 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.42.228.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.42.228.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.84.32.10 attackspam
1597295313 - 08/13/2020 07:08:33 Host: 181.84.32.10/181.84.32.10 Port: 445 TCP Blocked
2020-08-13 19:58:47
36.91.101.139 attackspam
Unauthorized connection attempt from IP address 36.91.101.139 on Port 445(SMB)
2020-08-13 19:53:26
158.69.0.38 attackbotsspam
SSHD unauthorised connection attempt (b)
2020-08-13 19:22:23
189.187.194.223 attackbots
Lines containing failures of 189.187.194.223
Aug 11 16:44:56 kmh-vmh-003-fsn07 sshd[31527]: Invalid user qwerty098 from 189.187.194.223 port 58320
Aug 11 16:44:56 kmh-vmh-003-fsn07 sshd[31527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.187.194.223 
Aug 11 16:44:57 kmh-vmh-003-fsn07 sshd[31527]: Failed password for invalid user qwerty098 from 189.187.194.223 port 58320 ssh2
Aug 11 16:44:58 kmh-vmh-003-fsn07 sshd[31527]: Received disconnect from 189.187.194.223 port 58320:11: Bye Bye [preauth]
Aug 11 16:44:58 kmh-vmh-003-fsn07 sshd[31527]: Disconnected from invalid user qwerty098 189.187.194.223 port 58320 [preauth]
Aug x@x
Aug 11 17:01:33 kmh-vmh-003-fsn07 sshd[967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.187.194.223 
Aug x@x
Aug 11 17:01:36 kmh-vmh-003-fsn07 sshd[967]: Received disconnect from 189.187.194.223 port 47645:11: Bye Bye [preauth]
Aug x@x
Aug 11 17:05:29 kmh-........
------------------------------
2020-08-13 19:47:48
181.40.73.86 attackspambots
Aug 13 08:14:43 lnxded64 sshd[9053]: Failed password for root from 181.40.73.86 port 6279 ssh2
Aug 13 08:17:40 lnxded64 sshd[9760]: Failed password for root from 181.40.73.86 port 23074 ssh2
2020-08-13 19:24:00
140.213.57.18 attackspam
1597290421 - 08/13/2020 05:47:01 Host: 140.213.57.18/140.213.57.18 Port: 445 TCP Blocked
2020-08-13 19:29:36
186.226.227.212 attack
Attempted connection to port 445.
2020-08-13 19:33:51
150.138.249.222 attack
Attempted connection to port 16491.
2020-08-13 19:40:48
45.167.10.9 attackbotsspam
mail brute force
2020-08-13 19:59:16
118.25.11.204 attack
reported through recidive - multiple failed attempts(SSH)
2020-08-13 19:38:24
178.208.99.235 attackspambots
2020-08-13T13:45:02.861383vps773228.ovh.net sshd[5574]: Failed password for root from 178.208.99.235 port 58226 ssh2
2020-08-13T13:48:46.152529vps773228.ovh.net sshd[5640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.208.99.235  user=root
2020-08-13T13:48:47.966777vps773228.ovh.net sshd[5640]: Failed password for root from 178.208.99.235 port 39986 ssh2
2020-08-13T13:52:25.915949vps773228.ovh.net sshd[5712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.208.99.235  user=root
2020-08-13T13:52:28.456986vps773228.ovh.net sshd[5712]: Failed password for root from 178.208.99.235 port 49998 ssh2
...
2020-08-13 19:59:55
27.65.107.177 attackspam
Attempted connection to port 88.
2020-08-13 19:33:25
116.196.101.168 attackspam
Aug 13 17:53:22 itv-usvr-01 sshd[22451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168  user=root
Aug 13 17:53:24 itv-usvr-01 sshd[22451]: Failed password for root from 116.196.101.168 port 49442 ssh2
Aug 13 17:57:25 itv-usvr-01 sshd[23027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168  user=root
Aug 13 17:57:27 itv-usvr-01 sshd[23027]: Failed password for root from 116.196.101.168 port 35402 ssh2
Aug 13 17:59:41 itv-usvr-01 sshd[23141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168  user=root
Aug 13 17:59:43 itv-usvr-01 sshd[23141]: Failed password for root from 116.196.101.168 port 33916 ssh2
2020-08-13 19:23:38
148.70.208.187 attackbots
SSH Brute-Forcing (server2)
2020-08-13 19:28:42
218.92.0.175 attackbotsspam
Aug 13 13:13:59 abendstille sshd\[30791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Aug 13 13:14:01 abendstille sshd\[30791\]: Failed password for root from 218.92.0.175 port 43667 ssh2
Aug 13 13:14:04 abendstille sshd\[30791\]: Failed password for root from 218.92.0.175 port 43667 ssh2
Aug 13 13:14:08 abendstille sshd\[30791\]: Failed password for root from 218.92.0.175 port 43667 ssh2
Aug 13 13:14:11 abendstille sshd\[30791\]: Failed password for root from 218.92.0.175 port 43667 ssh2
...
2020-08-13 19:25:18

Recently Reported IPs

253.217.130.226 227.175.154.112 113.149.167.162 253.233.223.23
41.11.21.49 39.110.109.45 195.210.185.242 239.158.189.173
234.19.163.68 180.38.57.197 19.246.19.162 217.234.163.172
54.9.38.33 192.29.134.159 230.211.202.241 51.248.144.171
169.64.162.39 93.171.209.206 149.145.135.183 254.100.173.66