Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boa Vista do Jauato

Region: Amazonas

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
192.140.42.29 attackbots
email spam
2020-02-29 17:52:25
192.140.42.185 attackspambots
Unauthorized connection attempt from IP address 192.140.42.185 on Port 445(SMB)
2020-02-15 04:42:42
192.140.42.185 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-20 02:15:30
192.140.42.29 attackspam
email spam
2019-11-05 20:44:34
192.140.42.82 attackspambots
(From silke.goward@gmail.com) Hi,
Do you want to reach new clients? 

We are personally welcoming you to sign up with one of the leading influencer and affiliate networks on the web. 
This network finds influencers and affiliates in your niche who will promote your products/services on their websites and social media channels. 
Benefits of our program consist of: brand exposure for your business, increased reputation, and potentially more clients. 

It's the best, easiest and most efficient way to increase your sales! 

What do you think?

Find out more here: http://socialinfluencer.nicheadvertising.online
2019-10-25 05:43:17
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.140.42.179
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62376
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.140.42.179.			IN	A

;; AUTHORITY SECTION:
.			258	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021100101 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 02 04:04:36 CST 2021
;; MSG SIZE  rcvd: 107
Host info
179.42.140.192.in-addr.arpa domain name pointer 192-140-42-179.allfiber.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
179.42.140.192.in-addr.arpa	name = 192-140-42-179.allfiber.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.200 attack
Nov 17 22:44:55 venus sshd\[21843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
Nov 17 22:44:57 venus sshd\[21843\]: Failed password for root from 218.92.0.200 port 36665 ssh2
Nov 17 22:44:59 venus sshd\[21843\]: Failed password for root from 218.92.0.200 port 36665 ssh2
...
2019-11-18 06:54:06
76.220.214.120 attackspam
fire
2019-11-18 07:10:55
42.238.142.56 attack
port scan and connect, tcp 23 (telnet)
2019-11-18 06:57:58
81.156.12.173 attackbots
fire
2019-11-18 07:05:36
73.189.112.132 attack
fire
2019-11-18 07:16:56
77.8.140.231 attackspam
fire
2019-11-18 07:07:27
187.0.221.222 attack
2019-11-17T19:17:34.278642tmaserv sshd\[26200\]: Failed password for root from 187.0.221.222 port 4072 ssh2
2019-11-17T20:21:11.660801tmaserv sshd\[29514\]: Invalid user pass124 from 187.0.221.222 port 7939
2019-11-17T20:21:11.667075tmaserv sshd\[29514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.0.221.222
2019-11-17T20:21:13.355817tmaserv sshd\[29514\]: Failed password for invalid user pass124 from 187.0.221.222 port 7939 ssh2
2019-11-17T20:25:50.641767tmaserv sshd\[29545\]: Invalid user jed from 187.0.221.222 port 26224
2019-11-17T20:25:50.648231tmaserv sshd\[29545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.0.221.222
...
2019-11-18 06:42:49
49.88.112.70 attackspambots
2019-11-17T23:07:44.773321shield sshd\[19695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
2019-11-17T23:07:46.760029shield sshd\[19695\]: Failed password for root from 49.88.112.70 port 40949 ssh2
2019-11-17T23:07:48.913783shield sshd\[19695\]: Failed password for root from 49.88.112.70 port 40949 ssh2
2019-11-17T23:07:50.809325shield sshd\[19695\]: Failed password for root from 49.88.112.70 port 40949 ssh2
2019-11-17T23:11:32.112819shield sshd\[19841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
2019-11-18 07:12:58
87.197.190.229 attackbotsspam
fire
2019-11-18 06:47:35
46.38.144.17 attackbotsspam
Nov 18 00:02:27 webserver postfix/smtpd\[2888\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 18 00:03:04 webserver postfix/smtpd\[1916\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 18 00:03:41 webserver postfix/smtpd\[2888\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 18 00:04:20 webserver postfix/smtpd\[2888\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 18 00:04:56 webserver postfix/smtpd\[1916\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-18 07:08:36
81.174.170.85 attack
fire
2019-11-18 07:04:49
87.98.164.154 attack
fire
2019-11-18 06:46:56
74.66.94.83 attackbotsspam
fire
2019-11-18 07:12:18
74.129.23.72 attack
fire
2019-11-18 07:12:37
185.110.21.165 attackspambots
" "
2019-11-18 07:16:00

Recently Reported IPs

14.192.2.114 45.144.225.64 103.228.158.18 34.141.87.92
34.142.123.2 34.94.171.158 95.185.152.181 13.212.6.88
13.212.6.51 102.159.6.220 217.159.147.6 35.172.192.42
229.245.13.244 46.161.11.133 150.230.59.118 152.70.83.209
189.219.120.160 200.68.129.119 27.131.209.230 101.78.67.216