Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zumpango del Río

Region: Guerrero

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.254.42.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60549
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;189.254.42.222.			IN	A

;; AUTHORITY SECTION:
.			450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060101 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 02 10:39:32 CST 2020
;; MSG SIZE  rcvd: 118
Host info
222.42.254.189.in-addr.arpa domain name pointer customer-189-254-42-222-sta.uninet-ide.com.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
222.42.254.189.in-addr.arpa	name = customer-189-254-42-222-sta.uninet-ide.com.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.95.168.91 attack
SSH login attempts.
2020-06-19 20:04:48
80.11.29.177 attack
Jun 19 08:10:41 ny01 sshd[16024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.11.29.177
Jun 19 08:10:43 ny01 sshd[16024]: Failed password for invalid user uploader from 80.11.29.177 port 46246 ssh2
Jun 19 08:18:14 ny01 sshd[17002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.11.29.177
2020-06-19 20:23:26
111.229.70.97 attackbotsspam
2020-06-19T09:36:27+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-06-19 20:00:43
87.246.7.22 attackbotsspam
spam (f2b h2)
2020-06-19 20:11:22
157.245.105.149 attackspambots
Invalid user qa from 157.245.105.149 port 37170
2020-06-19 20:03:13
46.101.151.97 attack
Invalid user joe from 46.101.151.97 port 40731
2020-06-19 20:02:26
129.226.74.89 attack
Jun 19 12:12:32 vpn01 sshd[19084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.74.89
Jun 19 12:12:33 vpn01 sshd[19084]: Failed password for invalid user programacion from 129.226.74.89 port 47014 ssh2
...
2020-06-19 20:00:26
111.230.157.219 attackspam
Invalid user admin from 111.230.157.219 port 47154
2020-06-19 20:08:47
106.12.198.232 attackbots
k+ssh-bruteforce
2020-06-19 20:03:31
189.39.102.67 attackbotsspam
2020-06-19T08:39:06.322509afi-git.jinr.ru sshd[25071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.39.102.67
2020-06-19T08:39:06.316903afi-git.jinr.ru sshd[25071]: Invalid user user from 189.39.102.67 port 46416
2020-06-19T08:39:08.701070afi-git.jinr.ru sshd[25071]: Failed password for invalid user user from 189.39.102.67 port 46416 ssh2
2020-06-19T08:43:04.392256afi-git.jinr.ru sshd[26012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.39.102.67  user=root
2020-06-19T08:43:07.111634afi-git.jinr.ru sshd[26012]: Failed password for root from 189.39.102.67 port 45992 ssh2
...
2020-06-19 20:13:12
47.94.1.121 attackbotsspam
Jun 19 08:18:06 Host-KEWR-E sshd[18903]: Invalid user iris from 47.94.1.121 port 42340
...
2020-06-19 20:30:33
103.102.141.61 attack
DATE:2020-06-19 05:52:22, IP:103.102.141.61, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-06-19 20:12:38
51.83.75.97 attackbotsspam
2020-06-19T12:16:00.609903mail.csmailer.org sshd[11770]: Invalid user test from 51.83.75.97 port 52546
2020-06-19T12:16:00.613211mail.csmailer.org sshd[11770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.ip-51-83-75.eu
2020-06-19T12:16:00.609903mail.csmailer.org sshd[11770]: Invalid user test from 51.83.75.97 port 52546
2020-06-19T12:16:02.915934mail.csmailer.org sshd[11770]: Failed password for invalid user test from 51.83.75.97 port 52546 ssh2
2020-06-19T12:19:15.885867mail.csmailer.org sshd[12467]: Invalid user data from 51.83.75.97 port 53614
...
2020-06-19 20:32:00
182.16.110.190 attack
" "
2020-06-19 20:20:57
203.195.211.173 attackbotsspam
Jun 19 14:15:27 vps687878 sshd\[10212\]: Failed password for invalid user christian from 203.195.211.173 port 40566 ssh2
Jun 19 14:16:28 vps687878 sshd\[10451\]: Invalid user oracle from 203.195.211.173 port 51730
Jun 19 14:16:28 vps687878 sshd\[10451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.211.173
Jun 19 14:16:30 vps687878 sshd\[10451\]: Failed password for invalid user oracle from 203.195.211.173 port 51730 ssh2
Jun 19 14:17:33 vps687878 sshd\[10522\]: Invalid user mike from 203.195.211.173 port 34658
Jun 19 14:17:33 vps687878 sshd\[10522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.211.173
...
2020-06-19 20:20:11

Recently Reported IPs

104.90.215.175 73.206.190.85 38.212.192.206 67.82.249.19
135.234.163.235 169.39.35.248 2.200.195.46 153.232.34.100
214.57.146.215 36.226.31.136 163.55.79.54 20.95.234.24
144.128.4.157 80.219.75.186 223.226.56.220 143.78.49.218
182.63.231.75 173.198.27.245 153.47.118.195 40.11.63.252