Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.125.170.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.125.170.42.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 15:36:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
42.170.125.185.in-addr.arpa domain name pointer static.185.125.170.42.terrahost.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.170.125.185.in-addr.arpa	name = static.185.125.170.42.terrahost.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.248.49.62 attack
SSH bruteforce
2019-11-02 07:13:21
103.245.181.2 attackbotsspam
Nov  2 00:55:02 sauna sshd[164881]: Failed password for root from 103.245.181.2 port 36706 ssh2
...
2019-11-02 07:12:44
188.166.87.238 attackspambots
$f2bV_matches
2019-11-02 07:15:39
42.247.5.76 attackbotsspam
1433/tcp
[2019-11-01]1pkt
2019-11-02 07:03:55
187.17.167.125 attack
23/tcp
[2019-11-01]1pkt
2019-11-02 06:52:26
167.172.138.156 attackspam
Triggered: repeated knocking on closed ports.
2019-11-02 07:23:56
14.198.6.164 attackspam
Nov  1 13:00:22 eddieflores sshd\[12524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=014198006164.ctinets.com  user=root
Nov  1 13:00:24 eddieflores sshd\[12524\]: Failed password for root from 14.198.6.164 port 57410 ssh2
Nov  1 13:04:09 eddieflores sshd\[12858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=014198006164.ctinets.com  user=root
Nov  1 13:04:10 eddieflores sshd\[12858\]: Failed password for root from 14.198.6.164 port 39316 ssh2
Nov  1 13:07:49 eddieflores sshd\[13338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=014198006164.ctinets.com  user=root
2019-11-02 07:16:47
112.112.102.79 attackspam
Automatic report - Banned IP Access
2019-11-02 06:49:01
187.189.114.187 attack
445/tcp
[2019-11-01]1pkt
2019-11-02 07:14:48
111.231.137.158 attackbotsspam
Nov  1 21:26:56 lnxmail61 sshd[7870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.137.158
Nov  1 21:26:58 lnxmail61 sshd[7870]: Failed password for invalid user user3 from 111.231.137.158 port 59674 ssh2
Nov  1 21:33:17 lnxmail61 sshd[8562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.137.158
2019-11-02 06:51:44
157.245.107.153 attack
Nov  1 20:22:49 *** sshd[10294]: User root from 157.245.107.153 not allowed because not listed in AllowUsers
2019-11-02 07:15:00
51.83.69.78 attackbotsspam
$f2bV_matches
2019-11-02 07:22:18
177.86.125.63 attackbotsspam
Unauthorised access (Nov  1) SRC=177.86.125.63 LEN=44 TOS=0x10 PREC=0x40 TTL=238 ID=35007 DF TCP DPT=8080 WINDOW=14600 SYN
2019-11-02 07:15:19
103.36.84.100 attack
Nov  1 12:53:10 eddieflores sshd\[11861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.100  user=root
Nov  1 12:53:11 eddieflores sshd\[11861\]: Failed password for root from 103.36.84.100 port 58212 ssh2
Nov  1 12:57:57 eddieflores sshd\[12262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.100  user=root
Nov  1 12:57:58 eddieflores sshd\[12262\]: Failed password for root from 103.36.84.100 port 42118 ssh2
Nov  1 13:02:44 eddieflores sshd\[12721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.100  user=root
2019-11-02 07:04:11
103.253.2.174 attackbots
proto=tcp  .  spt=48236  .  dpt=25  .     (Found on   Dark List de Nov 01)     (657)
2019-11-02 06:51:01

Recently Reported IPs

181.225.67.169 35.187.224.178 209.85.160.202 49.205.102.56
117.208.136.41 183.89.15.19 197.55.72.128 212.129.26.205
188.59.40.196 196.44.181.37 47.242.33.148 83.249.219.90
109.122.221.189 123.245.241.8 190.39.117.129 155.94.166.42
89.216.93.230 39.79.43.209 208.126.94.10 110.77.207.59