Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.142.42.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32920
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;175.142.42.197.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:25:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 197.42.142.175.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.42.142.175.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.255.251.126 attack
Oct 13 14:02:32 game-panel sshd[30817]: Failed password for root from 168.255.251.126 port 38746 ssh2
Oct 13 14:05:47 game-panel sshd[30920]: Failed password for root from 168.255.251.126 port 43088 ssh2
2019-10-13 22:23:57
112.91.58.238 attack
IMAP brute force
...
2019-10-13 22:15:07
54.39.196.199 attackspambots
Oct 13 11:08:02 firewall sshd[13524]: Failed password for root from 54.39.196.199 port 52438 ssh2
Oct 13 11:12:00 firewall sshd[13775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.196.199  user=root
Oct 13 11:12:02 firewall sshd[13775]: Failed password for root from 54.39.196.199 port 36566 ssh2
...
2019-10-13 22:27:24
47.22.135.70 attack
Oct 13 14:23:17 icinga sshd[16679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.22.135.70
Oct 13 14:23:18 icinga sshd[16679]: Failed password for invalid user ubnt from 47.22.135.70 port 26649 ssh2
...
2019-10-13 21:58:56
85.185.149.28 attackspambots
Oct 13 16:20:19 legacy sshd[19778]: Failed password for root from 85.185.149.28 port 33593 ssh2
Oct 13 16:24:10 legacy sshd[19913]: Failed password for root from 85.185.149.28 port 50044 ssh2
...
2019-10-13 22:29:08
87.97.107.5 attack
port scan and connect, tcp 8080 (http-proxy)
2019-10-13 22:07:47
192.241.249.19 attackspambots
Oct 13 14:23:22 herz-der-gamer sshd[25046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.19  user=root
Oct 13 14:23:23 herz-der-gamer sshd[25046]: Failed password for root from 192.241.249.19 port 56802 ssh2
Oct 13 14:43:24 herz-der-gamer sshd[25625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.19  user=root
Oct 13 14:43:25 herz-der-gamer sshd[25625]: Failed password for root from 192.241.249.19 port 58439 ssh2
...
2019-10-13 22:00:37
188.165.242.200 attackbotsspam
Oct 13 15:07:02 XXX sshd[24701]: Invalid user ofsaa from 188.165.242.200 port 57520
2019-10-13 22:25:11
222.186.175.8 attack
Oct 13 20:58:06 itv-usvr-02 sshd[1384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.8  user=root
Oct 13 20:58:08 itv-usvr-02 sshd[1384]: Failed password for root from 222.186.175.8 port 17302 ssh2
2019-10-13 22:11:58
222.186.180.41 attackspambots
Fail2Ban Ban Triggered
2019-10-13 21:55:52
89.223.30.218 attack
2019-10-13T19:25:13.230873enmeeting.mahidol.ac.th sshd\[29938\]: User root from 157353.simplecloud.ru not allowed because not listed in AllowUsers
2019-10-13T19:25:13.359354enmeeting.mahidol.ac.th sshd\[29938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157353.simplecloud.ru  user=root
2019-10-13T19:25:15.679504enmeeting.mahidol.ac.th sshd\[29938\]: Failed password for invalid user root from 89.223.30.218 port 40780 ssh2
...
2019-10-13 22:01:54
222.186.173.183 attack
Oct 13 11:41:30 firewall sshd[14974]: Failed password for root from 222.186.173.183 port 58218 ssh2
Oct 13 11:41:34 firewall sshd[14974]: Failed password for root from 222.186.173.183 port 58218 ssh2
Oct 13 11:41:39 firewall sshd[14974]: Failed password for root from 222.186.173.183 port 58218 ssh2
...
2019-10-13 22:41:58
85.15.75.66 attackspam
Oct 13 15:18:22 dedicated sshd[13749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.15.75.66  user=root
Oct 13 15:18:24 dedicated sshd[13749]: Failed password for root from 85.15.75.66 port 47012 ssh2
2019-10-13 22:34:47
46.171.28.162 attack
Autoban   46.171.28.162 AUTH/CONNECT
2019-10-13 22:33:04
167.71.40.125 attack
Oct 13 14:11:19 hcbbdb sshd\[25898\]: Invalid user 123@India from 167.71.40.125
Oct 13 14:11:19 hcbbdb sshd\[25898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.40.125
Oct 13 14:11:21 hcbbdb sshd\[25898\]: Failed password for invalid user 123@India from 167.71.40.125 port 44006 ssh2
Oct 13 14:15:12 hcbbdb sshd\[26329\]: Invalid user Fast2017 from 167.71.40.125
Oct 13 14:15:12 hcbbdb sshd\[26329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.40.125
2019-10-13 22:20:48

Recently Reported IPs

220.171.34.195 114.97.140.231 2.182.153.223 59.93.29.113
178.20.28.87 216.31.252.249 83.222.187.158 93.40.6.247
110.150.119.32 185.31.175.252 41.237.50.100 27.115.124.108
122.160.11.161 163.123.142.77 222.140.163.85 5.253.27.91
202.164.136.200 52.113.204.43 41.75.126.11 83.1.192.168