Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.103.25.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.103.25.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 15:05:49 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 242.25.103.164.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 242.25.103.164.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
13.74.156.41 attack
Mar 16 15:47:06 b2b-pharm sshd[18592]: Did not receive identification string from 13.74.156.41 port 54294
Mar 16 15:51:30 b2b-pharm sshd[18618]: Invalid user 185.219.133.89 - SSH-2.0-Ope.SSH_7.2p2 Ubuntu-4ubuntu2.8r from 13.74.156.41 port 51210
Mar 16 15:51:30 b2b-pharm sshd[18618]: Invalid user 185.219.133.89 - SSH-2.0-Ope.SSH_7.2p2 Ubuntu-4ubuntu2.8r from 13.74.156.41 port 51210
Mar 16 15:51:30 b2b-pharm sshd[18618]: error: maximum authentication attempts exceeded for invalid user 185.219.133.89 - SSH-2.0-Ope.SSH_7.2p2 Ubuntu-4ubuntu2.8r from 13.74.156.41 port 51210 ssh2 [preauth]
Mar 16 15:51:30 b2b-pharm sshd[18618]: Invalid user 185.219.133.89 - SSH-2.0-Ope.SSH_7.2p2 Ubuntu-4ubuntu2.8r from 13.74.156.41 port 51210
Mar 16 15:51:30 b2b-pharm sshd[18618]: error: maximum authentication attempts exceeded for invalid user 185.219.133.89 - SSH-2.0-Ope.SSH_7.2p2 Ubuntu-4ubuntu2.8r from 13.74.156.41 port 51210 ssh2 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/vi
2020-03-16 23:41:36
162.243.133.35 attack
RPC Portmapper DUMP Request Detected
2020-03-16 23:39:05
63.82.49.161 attackbotsspam
Mar 16 13:24:14 web01 postfix/smtpd[12674]: connect from group.kaagaan.com[63.82.49.161]
Mar 16 13:24:14 web01 policyd-spf[12676]: None; identhostnamey=helo; client-ip=63.82.49.161; helo=group.teedasa.com; envelope-from=x@x
Mar 16 13:24:14 web01 policyd-spf[12676]: Pass; identhostnamey=mailfrom; client-ip=63.82.49.161; helo=group.teedasa.com; envelope-from=x@x
Mar x@x
Mar 16 13:24:15 web01 postfix/smtpd[12674]: disconnect from group.kaagaan.com[63.82.49.161]
Mar 16 13:26:10 web01 postfix/smtpd[12674]: connect from group.kaagaan.com[63.82.49.161]
Mar 16 13:26:10 web01 policyd-spf[12676]: None; identhostnamey=helo; client-ip=63.82.49.161; helo=group.teedasa.com; envelope-from=x@x
Mar 16 13:26:10 web01 policyd-spf[12676]: Pass; identhostnamey=mailfrom; client-ip=63.82.49.161; helo=group.teedasa.com; envelope-from=x@x
Mar x@x
Mar 16 13:26:11 web01 postfix/smtpd[12674]: disconnect from group.kaagaan.com[63.82.49.161]
Mar 16 13:26:16 web01 postfix/smtpd[12670]: connect from g........
-------------------------------
2020-03-16 23:01:51
92.63.194.107 attackbotsspam
Mar 16 16:48:36 localhost sshd\[1564\]: Invalid user admin from 92.63.194.107
Mar 16 16:48:36 localhost sshd\[1564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.107
Mar 16 16:48:38 localhost sshd\[1564\]: Failed password for invalid user admin from 92.63.194.107 port 34597 ssh2
Mar 16 16:48:51 localhost sshd\[1596\]: Invalid user ubnt from 92.63.194.107
Mar 16 16:48:51 localhost sshd\[1596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.107
...
2020-03-16 23:56:13
46.209.209.74 attackbotsspam
Unauthorized connection attempt detected from IP address 46.209.209.74 to port 1433
2020-03-16 23:17:08
63.82.48.113 attackspambots
Mar 16 13:24:27 web01 postfix/smtpd[12370]: connect from comb.saparel.com[63.82.48.113]
Mar 16 13:24:27 web01 policyd-spf[12375]: None; identhostnamey=helo; client-ip=63.82.48.113; helo=comb.kranbery.com; envelope-from=x@x
Mar 16 13:24:27 web01 policyd-spf[12375]: Pass; identhostnamey=mailfrom; client-ip=63.82.48.113; helo=comb.kranbery.com; envelope-from=x@x
Mar x@x
Mar 16 13:24:27 web01 postfix/smtpd[12370]: disconnect from comb.saparel.com[63.82.48.113]
Mar 16 13:25:33 web01 postfix/smtpd[12674]: connect from comb.saparel.com[63.82.48.113]
Mar 16 13:25:33 web01 policyd-spf[12676]: None; identhostnamey=helo; client-ip=63.82.48.113; helo=comb.kranbery.com; envelope-from=x@x
Mar 16 13:25:33 web01 policyd-spf[12676]: Pass; identhostnamey=mailfrom; client-ip=63.82.48.113; helo=comb.kranbery.com; envelope-from=x@x
Mar x@x
Mar 16 13:25:34 web01 postfix/smtpd[12674]: disconnect from comb.saparel.com[63.82.48.113]
Mar 16 13:26:51 web01 postfix/smtpd[12670]: connect from comb.........
-------------------------------
2020-03-16 23:15:37
45.119.212.125 attack
[MK-VM1] Blocked by UFW
2020-03-16 23:36:59
222.82.214.218 attack
Mar 16 15:39:59 ovpn sshd\[4438\]: Invalid user f2 from 222.82.214.218
Mar 16 15:39:59 ovpn sshd\[4438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.214.218
Mar 16 15:40:01 ovpn sshd\[4438\]: Failed password for invalid user f2 from 222.82.214.218 port 5418 ssh2
Mar 16 15:45:41 ovpn sshd\[5907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.214.218  user=root
Mar 16 15:45:42 ovpn sshd\[5907\]: Failed password for root from 222.82.214.218 port 5419 ssh2
2020-03-16 22:59:45
159.89.207.86 attackspambots
Mar 16 06:07:35  sshd\[24394\]: User root from 159.89.207.86 not allowed because not listed in AllowUsersMar 16 06:07:37  sshd\[24394\]: Failed password for invalid user root from 159.89.207.86 port 39156 ssh2
...
2020-03-16 22:47:24
88.206.74.130 attack
Fail2Ban Ban Triggered
2020-03-16 22:49:57
168.187.86.33 attack
Unauthorized connection attempt from IP address 168.187.86.33 on Port 445(SMB)
2020-03-16 23:45:03
185.200.118.89 attackbotsspam
Unauthorized connection attempt from IP address 185.200.118.89 on Port 3389(RDP)
2020-03-16 23:43:09
91.202.252.118 attackspam
Unauthorized connection attempt from IP address 91.202.252.118 on Port 445(SMB)
2020-03-16 23:15:03
157.50.237.225 attack
Unauthorized connection attempt from IP address 157.50.237.225 on Port 445(SMB)
2020-03-16 22:50:48
222.186.173.215 attackspambots
Mar 16 05:10:06 php1 sshd\[26940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Mar 16 05:10:07 php1 sshd\[26940\]: Failed password for root from 222.186.173.215 port 53196 ssh2
Mar 16 05:10:16 php1 sshd\[26940\]: Failed password for root from 222.186.173.215 port 53196 ssh2
Mar 16 05:10:22 php1 sshd\[26940\]: Failed password for root from 222.186.173.215 port 53196 ssh2
Mar 16 05:10:29 php1 sshd\[26970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
2020-03-16 23:12:25

Recently Reported IPs

57.7.73.193 154.199.57.88 136.52.200.186 121.148.174.237
103.70.128.200 205.242.0.42 108.231.152.90 28.155.37.101
4.139.26.12 219.68.196.27 213.106.20.11 138.5.245.185
234.189.11.89 218.95.45.42 136.0.52.145 179.40.95.177
56.73.118.170 219.3.124.239 60.157.67.223 12.162.24.46