Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.142.40.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48313
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.142.40.42.			IN	A

;; AUTHORITY SECTION:
.			431	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 10:31:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.40.142.185.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.40.142.185.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.83.176.3 attack
PHISHING ATTACK  "Start working from home for only $1, (..@serajmail.com) "
2020-12-13 08:33:09
172.17.100.254 normal
172.17.100.254
2020-12-09 09:43:24
151.236.35.245 attack
Multiple Userids attempting Login to QNAP NAS
2020-12-03 22:15:19
107.158.49.11 attack
PHISHING ATTACK  "Bring the magic of Christmas to your home!" "Certified Santa Letters "
2020-12-13 08:25:22
209.85.210.169 spam
Fake email offering service using known details from my contacts etc.
2020-12-10 00:18:55
185.202.2.17 attack
Bruteforce.generic.RDP.a blocked by Kaspersky Endpoint Security. Same problem before reinstalling and using Kaspersky, gained access and Cryptolocked the company server.
2020-12-02 22:48:05
81.29.143.136 attack
11 Dec 2020 PHISHING ATTACK :"Bitcoin System uses top trading technology":
FROM Trading technology - ehxicqq@betrionse.at :
2020-12-13 08:59:42
193.56.28.205 attack
Dec 09 02:18:59 nameserver1.wifi6.mx postfix/smtpd[29849]: disconnect from unknown[193.56.28.205]
Dec 08 02:19:07 postfix/smtpd[29844]: connect from unknown[193.56.28.205]
Dec 08 02:19:07  postfix/smtpd[29844]: lost connection after EHLO from unknown[193.56.28.205]
Dec 08 02:19:07  postfix/smtpd[29844]: disconnect from unknown[193.56.28.205]
Dec 08 02:19:11  postfix/smtpd[29849]: connect from unknown[193.56.28.205]
Dec 08 02:19:12  postfix/smtpd[29849]: lost connection after EHLO from unknown[193.56.28.205]
Dec 08 02:19:12  postfix/smtpd[29849]: disconnect from unknown[193.56.28.205]
2020-12-09 16:33:00
183.160.239.60 attack
13 Dec 2020 PHISHING ATTACK "Popular Winter Coat You Need Now!";
CANADA GOOSE Online ;
2020-12-13 08:46:50
184.22.250.123 spam
Log
2020-12-06 06:17:25
185.63.253.200 attack
DAEB
2020-12-10 12:39:52
9.203.137.9 spamattack
11 Dec 2020 PHISHING ATTACK :"100% up to a whopping €500": 
"Deposit and play the biggest and best Jackpots" :
FROM support - azoticwryyatvces@hotmail.com  :  HELO cfdenselr.com :
2020-12-13 09:06:59
107.158.49.29 attack
PHISHING ATTACK  "Costco reward - Open immediately!"
2020-12-13 05:43:17
217.163.30.151 spambotsattackproxynormal
How can i claim my prize
2020-12-04 14:18:33
184.22.250.123 spambotsattackproxynormal
LOG
2020-12-06 06:19:57

Recently Reported IPs

185.141.232.233 185.144.83.13 185.145.184.185 185.143.220.236
185.145.186.83 185.149.107.210 185.15.21.71 185.151.147.46
185.148.102.254 185.152.136.108 185.150.237.236 185.151.0.146
185.147.212.251 185.152.46.19 185.152.46.96 185.150.238.13
185.152.94.150 185.152.94.133 185.152.94.109 185.152.94.152