Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.112.2.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.112.2.42.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101300 1800 900 604800 86400

;; Query time: 325 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 13 21:21:33 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 42.2.112.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		10.151.0.1
Address:	10.151.0.1#53

** server can't find 42.2.112.164.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
112.200.231.151 attackbotsspam
445/tcp 445/tcp 445/tcp
[2020-04-11]3pkt
2020-04-14 01:05:18
177.102.2.43 attackspambots
Automatic report - Port Scan Attack
2020-04-14 01:19:13
118.170.187.235 attack
37215/tcp 37215/tcp
[2020-04-12]2pkt
2020-04-14 01:14:06
114.156.3.187 attackspambots
7070/tcp 23/tcp 17/tcp...
[2020-02-13/04-12]1395pkt,174pt.(tcp)
2020-04-14 01:03:19
109.201.152.18 attack
Unauthorized connection attempt detected from IP address 109.201.152.18 to port 3389
2020-04-14 01:02:25
52.183.95.205 attackspambots
Apr 13 19:20:33 vpn01 sshd[7586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.183.95.205
Apr 13 19:20:35 vpn01 sshd[7586]: Failed password for invalid user admin from 52.183.95.205 port 54568 ssh2
...
2020-04-14 01:21:12
137.135.124.92 attackbots
sshd jail - ssh hack attempt
2020-04-14 01:09:53
89.248.168.112 attackspam
Unauthorized connection attempt detected from IP address 89.248.168.112 to port 5222
2020-04-14 01:31:39
195.54.166.104 attackbots
scans 61 times in preceeding hours on the ports (in chronological order) 23220 23225 23359 23145 23012 23009 23226 23449 23414 23105 23067 23359 23441 23003 23497 23259 23488 23249 23138 23240 23276 23137 23012 23030 23217 23007 23013 23035 23034 23093 23184 23267 23201 23226 23052 23405 23428 23216 23193 23339 23183 23172 23436 23176 23087 23112 23132 23383 23043 23026 23175 23255 23410 23148 23025 23312 23086 23258 23021 23056 23202 resulting in total of 183 scans from 195.54.166.0/23 block.
2020-04-14 01:00:50
182.61.34.155 attack
Apr 13 19:19:02 OPSO sshd\[18668\]: Invalid user dwairiuko from 182.61.34.155 port 57748
Apr 13 19:19:02 OPSO sshd\[18668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.34.155
Apr 13 19:19:04 OPSO sshd\[18668\]: Failed password for invalid user dwairiuko from 182.61.34.155 port 57748 ssh2
Apr 13 19:21:03 OPSO sshd\[19579\]: Invalid user alumni from 182.61.34.155 port 50382
Apr 13 19:21:03 OPSO sshd\[19579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.34.155
2020-04-14 01:24:43
74.50.197.51 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-04-14 01:02:52
200.59.188.217 attack
445/tcp 445/tcp
[2020-04-13]2pkt
2020-04-14 01:21:35
113.176.154.172 attackspambots
445/tcp
[2020-04-13]1pkt
2020-04-14 01:17:31
164.132.183.203 attackbotsspam
3333/tcp 4567/tcp 5683/tcp...
[2020-02-12/04-13]67pkt,40pt.(tcp)
2020-04-14 01:02:13
188.166.247.82 attack
Apr 13 17:16:08 scw-6657dc sshd[3348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82
Apr 13 17:16:08 scw-6657dc sshd[3348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82
Apr 13 17:16:09 scw-6657dc sshd[3348]: Failed password for invalid user visitor from 188.166.247.82 port 46138 ssh2
...
2020-04-14 01:21:51

Recently Reported IPs

139.126.167.54 82.203.25.204 204.152.104.25 211.75.94.163
230.57.4.65 14.17.112.85 9.63.161.56 187.75.169.106
108.143.118.68 182.77.139.125 185.156.177.88 180.254.141.143
18.209.245.205 217.66.93.97 250.24.246.94 119.110.66.142
66.223.225.188 44.45.6.24 117.254.56.244 40.67.63.190