Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sydney

Region: New South Wales

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.75.42.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37926
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.75.42.47.			IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400

;; Query time: 402 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 13:05:26 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 47.42.75.164.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 47.42.75.164.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
107.189.167.248 attack
Fail2Ban Ban Triggered
2020-03-18 01:27:28
31.131.191.105 attack
20/3/17@04:40:03: FAIL: Alarm-Network address from=31.131.191.105
...
2020-03-18 01:16:17
157.245.143.5 attackbots
xmlrpc attack
2020-03-18 00:47:45
36.68.5.166 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 17-03-2020 08:40:11.
2020-03-18 01:02:38
1.172.224.163 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-18 01:20:39
117.222.58.213 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 17-03-2020 08:40:09.
2020-03-18 01:07:13
112.104.139.33 attack
Unauthorized connection attempt detected from IP address 112.104.139.33 to port 445
2020-03-18 01:12:42
84.42.247.68 attackbots
Automatic report - Port Scan Attack
2020-03-18 00:45:44
176.119.116.187 attack
firewall-block, port(s): 23/tcp
2020-03-18 00:50:52
117.33.225.111 attackbotsspam
[MK-VM4] Blocked by UFW
2020-03-18 01:15:23
1.55.170.138 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 17-03-2020 08:40:09.
2020-03-18 01:09:12
106.13.147.123 attackspam
$f2bV_matches
2020-03-18 01:13:43
122.227.180.165 attackbotsspam
firewall-block, port(s): 1433/tcp
2020-03-18 01:01:31
115.159.196.214 attack
Mar 17 07:56:20 mockhub sshd[32166]: Failed password for root from 115.159.196.214 port 52900 ssh2
...
2020-03-18 00:43:35
119.252.143.68 attackspam
Automatic report - Port Scan
2020-03-18 00:56:39

Recently Reported IPs

126.191.162.219 204.93.165.115 210.22.82.225 89.243.81.88
103.230.93.176 129.213.43.164 207.180.236.235 106.13.75.97
142.71.84.112 104.206.206.58 191.97.52.188 223.3.143.129
196.211.192.242 63.255.235.168 185.107.60.245 206.53.63.30
201.154.39.135 197.171.122.18 142.179.245.77 206.228.221.89