Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.42.175.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;180.42.175.142.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:50:01 CST 2022
;; MSG SIZE  rcvd: 107
Host info
142.175.42.180.in-addr.arpa is an alias for 142.128.175.42.180.in-addr.arpa.
142.128.175.42.180.in-addr.arpa domain name pointer 180-042-175-142.jp.fiberbit.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.175.42.180.in-addr.arpa	canonical name = 142.128.175.42.180.in-addr.arpa.
142.128.175.42.180.in-addr.arpa	name = 180-042-175-142.jp.fiberbit.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.54.242.120 attack
2020-06-09T08:36:17.6183761240 sshd\[10631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.242.120  user=root
2020-06-09T08:36:19.8615361240 sshd\[10631\]: Failed password for root from 106.54.242.120 port 43010 ssh2
2020-06-09T08:45:44.7015851240 sshd\[11145\]: Invalid user zhangzhitong from 106.54.242.120 port 55710
2020-06-09T08:45:44.7063791240 sshd\[11145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.242.120
...
2020-06-09 17:33:42
118.70.168.216 attack
Brute forcing RDP port 3389
2020-06-09 17:54:52
63.148.46.109 attack
phishing
2020-06-09 17:31:07
187.102.177.60 attackspam
detected by Fail2Ban
2020-06-09 17:21:52
132.145.127.69 attackbotsspam
2020-06-09T05:27:40.135108mail.thespaminator.com sshd[15065]: Invalid user reg from 132.145.127.69 port 40142
2020-06-09T05:27:42.740671mail.thespaminator.com sshd[15065]: Failed password for invalid user reg from 132.145.127.69 port 40142 ssh2
...
2020-06-09 17:28:08
212.96.81.252 attack
firewall-block, port(s): 445/tcp
2020-06-09 17:41:49
116.73.83.123 attack
Automatic report - Port Scan Attack
2020-06-09 17:59:51
202.51.98.226 attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-06-09 17:48:58
222.186.175.169 attackspam
" "
2020-06-09 17:41:19
46.83.43.27 attackbots
Jun  9 11:11:38 minden010 postfix/smtpd[10906]: NOQUEUE: reject: RCPT from p2e532b1b.dip0.t-ipconnect.de[46.83.43.27]: 450 4.7.1 : Helo command rejected: Host not found; from=<> to= proto=ESMTP helo=
Jun  9 11:11:41 minden010 postfix/smtpd[26132]: NOQUEUE: reject: RCPT from p2e532b1b.dip0.t-ipconnect.de[46.83.43.27]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Jun  9 11:15:15 minden010 postfix/smtpd[10924]: NOQUEUE: reject: RCPT from p2e532b1b.dip0.t-ipconnect.de[46.83.43.27]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Jun  9 11:15:15 minden010 postfix/smtpd[12775]: NOQUEUE: reject: RCPT from p2e532b1b.dip0.t-ipconnect.de[46.83.43.27]: 450 4.7.1 : Helo command rejected: Host not found; from= to
...
2020-06-09 17:59:12
101.231.146.34 attackspambots
SSH Brute-Forcing (server1)
2020-06-09 17:28:42
178.62.113.55 attackbots
trying to access non-authorized port
2020-06-09 17:55:19
159.65.206.10 attack
TCP port 8080: Scan and connection
2020-06-09 17:30:32
167.114.192.224 attackbots
SSH brute-force: detected 1 distinct username(s) / 37 distinct password(s) within a 24-hour window.
2020-06-09 17:47:41
129.28.195.172 attackbots
Jun  9 11:27:27 PorscheCustomer sshd[27705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.195.172
Jun  9 11:27:29 PorscheCustomer sshd[27705]: Failed password for invalid user jbs from 129.28.195.172 port 49428 ssh2
Jun  9 11:30:15 PorscheCustomer sshd[27765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.195.172
...
2020-06-09 17:32:13

Recently Reported IPs

116.238.164.29 95.92.23.179 115.62.149.155 112.133.243.114
117.201.194.25 46.43.99.113 196.43.106.38 39.61.39.161
130.61.171.109 113.89.54.132 23.108.42.251 121.167.181.107
177.23.187.44 156.217.91.79 27.147.207.214 223.233.68.63
178.72.76.134 187.163.48.74 95.188.43.192 45.177.235.209