Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Märsta

Region: Stockholms

Country: Sweden

Internet Service Provider: Telia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.237.100.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22303
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.237.100.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 26 19:37:39 CST 2024
;; MSG SIZE  rcvd: 107
Host info
42.100.237.194.in-addr.arpa domain name pointer 194-237-100-42.customer.telia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.100.237.194.in-addr.arpa	name = 194-237-100-42.customer.telia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
84.147.220.84 attackspambots
Invalid user fk from 84.147.220.84 port 44416
2020-04-20 23:19:01
122.224.217.42 attackbotsspam
$f2bV_matches
2020-04-20 22:55:15
106.52.115.36 attack
(sshd) Failed SSH login from 106.52.115.36 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 20 15:33:21 srv sshd[11294]: Invalid user admin from 106.52.115.36 port 42084
Apr 20 15:33:22 srv sshd[11294]: Failed password for invalid user admin from 106.52.115.36 port 42084 ssh2
Apr 20 16:00:04 srv sshd[12210]: Invalid user gj from 106.52.115.36 port 45052
Apr 20 16:00:06 srv sshd[12210]: Failed password for invalid user gj from 106.52.115.36 port 45052 ssh2
Apr 20 16:04:06 srv sshd[12370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.115.36  user=root
2020-04-20 23:10:57
101.89.197.232 attackbots
$f2bV_matches
2020-04-20 23:15:18
64.182.177.216 attack
Invalid user ftptest from 64.182.177.216 port 43630
2020-04-20 23:23:29
95.83.4.23 attackspambots
2020-04-20 02:04:24 server sshd[29311]: Failed password for invalid user qr from 95.83.4.23 port 42382 ssh2
2020-04-20 23:15:42
119.235.19.66 attackbots
$f2bV_matches
2020-04-20 22:59:56
132.145.177.124 attackbots
Invalid user wooxo from 132.145.177.124 port 46345
2020-04-20 22:49:04
115.124.120.219 attackbotsspam
Apr 20 16:51:57 host sshd[24379]: Invalid user rig1 from 115.124.120.219 port 54281
...
2020-04-20 23:04:59
139.155.84.213 attackspambots
$f2bV_matches
2020-04-20 22:46:20
134.73.206.59 attackspam
Apr 20 09:01:15 lanister sshd[9701]: Failed password for root from 134.73.206.59 port 54366 ssh2
Apr 20 09:03:41 lanister sshd[9731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.206.59  user=root
Apr 20 09:03:43 lanister sshd[9731]: Failed password for root from 134.73.206.59 port 41080 ssh2
Apr 20 09:06:07 lanister sshd[9775]: Invalid user lifferay from 134.73.206.59
2020-04-20 22:48:11
116.255.175.37 attack
$f2bV_matches
2020-04-20 23:03:13
84.215.23.72 attackspam
Apr 20 14:23:02 XXXXXX sshd[7616]: Invalid user postgres from 84.215.23.72 port 43588
2020-04-20 23:18:39
120.53.11.11 attackspam
Invalid user postgres from 120.53.11.11 port 33784
2020-04-20 22:59:36
113.137.33.40 attackbots
Invalid user fr from 113.137.33.40 port 29701
2020-04-20 23:06:45

Recently Reported IPs

203.135.128.124 209.179.123.172 113.201.66.11 100.221.19.174
196.223.151.192 244.104.29.158 75.24.211.117 114.124.0.183
124.122.37.252 43.114.168.192 29.82.5.78 233.5.203.132
128.101.66.49 216.60.75.196 116.151.202.147 191.11.186.33
145.9.150.241 40.35.35.175 204.10.2.136 234.94.111.232