Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaunas

Region: Kaunas

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.219.42.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.219.42.161.			IN	A

;; AUTHORITY SECTION:
.			101	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 08:06:57 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 161.42.219.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.42.219.193.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.184.127 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-02-13 19:16:30
37.49.231.163 attack
Feb 13 11:11:56 h2177944 kernel: \[4786688.365003\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=12600 PROTO=TCP SPT=41597 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 13 11:11:56 h2177944 kernel: \[4786688.365018\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=12600 PROTO=TCP SPT=41597 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 13 11:39:14 h2177944 kernel: \[4788326.674143\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=24463 PROTO=TCP SPT=49395 DPT=50802 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 13 11:39:14 h2177944 kernel: \[4788326.674159\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=24463 PROTO=TCP SPT=49395 DPT=50802 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 13 11:47:04 h2177944 kernel: \[4788796.741228\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=37.49.231.163 DST=85.214.117
2020-02-13 18:52:34
220.132.0.42 attack
Unauthorised access (Feb 13) SRC=220.132.0.42 LEN=40 TTL=45 ID=21868 TCP DPT=23 WINDOW=52930 SYN
2020-02-13 18:53:06
112.133.248.121 attackbots
none
2020-02-13 18:59:22
49.232.43.151 attackbots
$f2bV_matches
2020-02-13 18:57:58
119.136.16.75 attackbotsspam
2020-02-13T01:49:13.6581621495-001 sshd[60121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.136.16.75  user=root
2020-02-13T01:49:15.2540151495-001 sshd[60121]: Failed password for root from 119.136.16.75 port 2242 ssh2
2020-02-13T01:52:59.6835861495-001 sshd[60340]: Invalid user elata from 119.136.16.75 port 2243
2020-02-13T01:52:59.6868001495-001 sshd[60340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.136.16.75
2020-02-13T01:52:59.6835861495-001 sshd[60340]: Invalid user elata from 119.136.16.75 port 2243
2020-02-13T01:53:01.6428971495-001 sshd[60340]: Failed password for invalid user elata from 119.136.16.75 port 2243 ssh2
2020-02-13T01:56:26.5469551495-001 sshd[60516]: Invalid user austin from 119.136.16.75 port 2244
2020-02-13T01:56:26.5553691495-001 sshd[60516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.136.16.75
2020-02-13T01:56:26.54
...
2020-02-13 19:40:31
194.166.255.53 attack
Feb 13 12:58:15 www sshd\[55840\]: Invalid user denis from 194.166.255.53Feb 13 12:58:17 www sshd\[55840\]: Failed password for invalid user denis from 194.166.255.53 port 45276 ssh2Feb 13 13:08:06 www sshd\[55874\]: Failed password for root from 194.166.255.53 port 55630 ssh2
...
2020-02-13 19:22:46
180.241.46.22 attack
Unauthorized connection attempt from IP address 180.241.46.22 on Port 445(SMB)
2020-02-13 19:39:28
2607:f298:5:100f::2de:63f6 attack
xmlrpc attack
2020-02-13 19:40:58
195.66.114.31 attackbotsspam
$f2bV_matches
2020-02-13 19:27:01
156.209.8.171 attackbotsspam
Unauthorized connection attempt from IP address 156.209.8.171 on Port 445(SMB)
2020-02-13 19:18:41
143.255.150.95 attackbots
DATE:2020-02-13 05:47:24, IP:143.255.150.95, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-02-13 19:14:11
202.175.46.170 attackspam
<6 unauthorized SSH connections
2020-02-13 19:01:03
186.210.190.171 attackspambots
Unauthorized connection attempt from IP address 186.210.190.171 on Port 445(SMB)
2020-02-13 19:18:14
54.37.157.88 attackbotsspam
Feb 13 10:27:09 vps647732 sshd[25817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.157.88
Feb 13 10:27:11 vps647732 sshd[25817]: Failed password for invalid user satsu from 54.37.157.88 port 50975 ssh2
...
2020-02-13 19:12:53

Recently Reported IPs

55.146.103.111 83.249.153.209 189.75.103.67 107.116.251.204
94.112.175.219 9.202.239.171 210.218.135.234 10.74.103.169
157.245.173.148 234.91.72.172 112.114.128.117 22.54.18.187
201.140.163.41 138.3.107.51 29.210.213.243 251.157.131.124
88.214.26.31 59.210.139.5 92.218.196.68 89.163.242.107