Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.189.213.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55103
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.189.213.42.			IN	A

;; AUTHORITY SECTION:
.			312	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091401 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 04:58:39 CST 2022
;; MSG SIZE  rcvd: 107
Host info
42.213.189.197.in-addr.arpa domain name pointer 42.213.189.197.reverse.xneelo.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.213.189.197.in-addr.arpa	name = 42.213.189.197.reverse.xneelo.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.253.23.7 attackspam
Nov 14 10:07:41 dallas01 sshd[860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.253.23.7
Nov 14 10:07:43 dallas01 sshd[860]: Failed password for invalid user plex from 92.253.23.7 port 51996 ssh2
Nov 14 10:12:20 dallas01 sshd[1817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.253.23.7
2019-11-15 02:44:44
148.70.59.114 attackspambots
Nov 14 21:37:18 server sshd\[11886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.59.114  user=root
Nov 14 21:37:20 server sshd\[11886\]: Failed password for root from 148.70.59.114 port 26782 ssh2
Nov 14 22:06:20 server sshd\[19388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.59.114  user=root
Nov 14 22:06:22 server sshd\[19388\]: Failed password for root from 148.70.59.114 port 19308 ssh2
Nov 14 22:10:35 server sshd\[20558\]: Invalid user cn from 148.70.59.114
Nov 14 22:10:35 server sshd\[20558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.59.114 
...
2019-11-15 03:11:31
91.98.111.102 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-15 03:12:04
149.200.160.185 attackspam
Unauthorised access (Nov 14) SRC=149.200.160.185 LEN=40 PREC=0x20 TTL=52 ID=40683 TCP DPT=8080 WINDOW=30261 SYN
2019-11-15 03:16:13
118.173.55.170 attack
Automatic report - Port Scan Attack
2019-11-15 03:10:05
71.6.232.2 attack
71.6.232.2 was recorded 5 times by 5 hosts attempting to connect to the following ports: 389. Incident counter (4h, 24h, all-time): 5, 11, 40
2019-11-15 03:06:10
79.137.73.253 attack
Nov 14 19:25:38 herz-der-gamer sshd[18058]: Invalid user jira from 79.137.73.253 port 43232
Nov 14 19:25:38 herz-der-gamer sshd[18058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.73.253
Nov 14 19:25:38 herz-der-gamer sshd[18058]: Invalid user jira from 79.137.73.253 port 43232
Nov 14 19:25:40 herz-der-gamer sshd[18058]: Failed password for invalid user jira from 79.137.73.253 port 43232 ssh2
...
2019-11-15 03:19:50
45.143.221.9 attackspambots
ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak
2019-11-15 03:15:50
93.190.230.110 attackspambots
Nov 14 15:35:24 mail sshd\[2408\]: Invalid user avanthi from 93.190.230.110
Nov 14 15:35:24 mail sshd\[2408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.190.230.110
Nov 14 15:35:26 mail sshd\[2408\]: Failed password for invalid user avanthi from 93.190.230.110 port 60998 ssh2
2019-11-15 02:50:14
149.56.132.202 attack
Invalid user guest from 149.56.132.202 port 50514
2019-11-15 03:17:39
167.249.170.26 attack
Sending SPAM email
2019-11-15 03:06:34
54.38.36.210 attackbots
Nov 14 19:52:31 server sshd\[16393\]: Invalid user sanyal from 54.38.36.210
Nov 14 19:52:31 server sshd\[16393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.210 
Nov 14 19:52:33 server sshd\[16393\]: Failed password for invalid user sanyal from 54.38.36.210 port 60894 ssh2
Nov 14 20:12:50 server sshd\[21555\]: Invalid user neene from 54.38.36.210
Nov 14 20:12:50 server sshd\[21555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.210 
...
2019-11-15 03:14:55
54.38.33.178 attackspambots
2019-11-14T17:42:18.976553  sshd[28225]: Invalid user kursd from 54.38.33.178 port 40838
2019-11-14T17:42:18.991146  sshd[28225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.33.178
2019-11-14T17:42:18.976553  sshd[28225]: Invalid user kursd from 54.38.33.178 port 40838
2019-11-14T17:42:21.204499  sshd[28225]: Failed password for invalid user kursd from 54.38.33.178 port 40838 ssh2
2019-11-14T17:46:07.168215  sshd[28343]: Invalid user ebi from 54.38.33.178 port 50214
...
2019-11-15 02:59:52
217.234.83.243 attackspambots
SSH invalid-user multiple login try
2019-11-15 03:08:07
5.188.210.226 attackspambots
Port scan on 6 port(s): 1080 3128 8081 8082 9000 53281
2019-11-15 02:45:50

Recently Reported IPs

195.135.94.203 192.100.213.7 191.23.218.199 189.173.173.64
23.254.90.67 37.35.40.178 172.241.192.104 38.124.61.82
192.46.212.220 153.141.45.22 77.235.126.94 115.79.220.12
115.49.35.116 117.65.78.78 117.88.176.3 51.210.107.83
201.103.137.61 118.119.14.191 190.213.61.80 191.12.81.250