Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.120.42.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41985
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.120.42.154.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 07:26:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
154.42.120.194.in-addr.arpa domain name pointer 194-120-42-154.biz.kpn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
154.42.120.194.in-addr.arpa	name = 194-120-42-154.biz.kpn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.153.74.86 attackspambots
Oct 21 16:16:24 sauna sshd[112716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.153.74.86
Oct 21 16:16:27 sauna sshd[112716]: Failed password for invalid user 123 from 59.153.74.86 port 43920 ssh2
...
2019-10-21 21:28:16
139.59.2.181 attack
WordPress login Brute force / Web App Attack on client site.
2019-10-21 21:42:22
157.230.57.77 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-10-21 21:52:39
114.25.35.18 attackspambots
" "
2019-10-21 21:14:59
112.196.72.188 attackbots
Oct 21 02:26:47 web9 sshd\[15962\]: Invalid user Inferno2017 from 112.196.72.188
Oct 21 02:26:47 web9 sshd\[15962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.72.188
Oct 21 02:26:48 web9 sshd\[15962\]: Failed password for invalid user Inferno2017 from 112.196.72.188 port 41130 ssh2
Oct 21 02:31:34 web9 sshd\[16608\]: Invalid user abcd123@ from 112.196.72.188
Oct 21 02:31:34 web9 sshd\[16608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.72.188
2019-10-21 21:23:51
195.43.189.10 attackbotsspam
Automatic report - Banned IP Access
2019-10-21 21:19:38
109.123.117.254 attackspam
Port Scan
2019-10-21 21:26:32
104.244.73.176 attackspambots
" "
2019-10-21 21:56:17
46.229.168.154 attack
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2019-10-21 21:53:42
42.116.255.216 attack
Oct 21 15:39:42 localhost sshd\[31635\]: Invalid user applmgr from 42.116.255.216 port 40978
Oct 21 15:39:42 localhost sshd\[31635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.116.255.216
Oct 21 15:39:44 localhost sshd\[31635\]: Failed password for invalid user applmgr from 42.116.255.216 port 40978 ssh2
2019-10-21 21:42:06
193.31.24.113 attackbots
10/21/2019-15:12:57.497685 193.31.24.113 Protocol: 6 SURICATA SMTP tls rejected
2019-10-21 21:28:44
199.249.230.65 attack
Automatic report - Banned IP Access
2019-10-21 21:47:00
185.234.218.96 attack
RDP_Brute_Force
2019-10-21 21:34:50
119.29.195.107 attackspam
Oct 21 14:44:43 bouncer sshd\[5652\]: Invalid user server from 119.29.195.107 port 36498
Oct 21 14:44:43 bouncer sshd\[5652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.195.107 
Oct 21 14:44:45 bouncer sshd\[5652\]: Failed password for invalid user server from 119.29.195.107 port 36498 ssh2
...
2019-10-21 21:43:34
61.178.29.191 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-21 21:21:36

Recently Reported IPs

2.249.166.103 88.40.187.94 39.104.152.38 98.238.180.61
239.174.150.63 208.115.249.28 121.174.127.157 175.66.89.184
26.241.103.238 146.140.230.230 19.92.235.231 8.219.199.70
122.219.63.170 219.187.224.89 95.14.196.167 146.103.189.80
135.207.207.2 198.240.180.29 18.55.123.178 17.3.20.158