Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.164.104.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15420
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;198.164.104.42.			IN	A

;; AUTHORITY SECTION:
.			433	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111201 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 13 07:09:05 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 42.104.164.198.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 42.104.164.198.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
14.248.226.155 attack
Bruteforce detected by fail2ban
2020-05-15 01:02:13
132.232.79.135 attackbots
May 14 14:04:45 ns392434 sshd[32369]: Invalid user english from 132.232.79.135 port 41662
May 14 14:04:45 ns392434 sshd[32369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.79.135
May 14 14:04:45 ns392434 sshd[32369]: Invalid user english from 132.232.79.135 port 41662
May 14 14:04:47 ns392434 sshd[32369]: Failed password for invalid user english from 132.232.79.135 port 41662 ssh2
May 14 14:19:22 ns392434 sshd[498]: Invalid user lee from 132.232.79.135 port 54212
May 14 14:19:22 ns392434 sshd[498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.79.135
May 14 14:19:22 ns392434 sshd[498]: Invalid user lee from 132.232.79.135 port 54212
May 14 14:19:23 ns392434 sshd[498]: Failed password for invalid user lee from 132.232.79.135 port 54212 ssh2
May 14 14:24:39 ns392434 sshd[762]: Invalid user postgres from 132.232.79.135 port 59646
2020-05-15 00:47:42
167.114.115.33 attackspam
Invalid user gmodserver from 167.114.115.33 port 35146
2020-05-15 00:23:28
168.232.167.58 attack
Invalid user invoices from 168.232.167.58 port 43844
2020-05-15 00:38:08
51.15.37.97 attackbots
WordPress user registration, really-simple-captcha js check bypass
2020-05-15 01:01:35
119.75.8.50 attackspambots
trying to access non-authorized port
2020-05-15 01:08:42
159.65.174.81 attackspambots
May 14 12:24:33 scw-6657dc sshd[11220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.174.81
May 14 12:24:33 scw-6657dc sshd[11220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.174.81
May 14 12:24:35 scw-6657dc sshd[11220]: Failed password for invalid user rise from 159.65.174.81 port 33114 ssh2
...
2020-05-15 00:52:38
49.88.112.75 attack
May 14 2020, 16:48:33 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-05-15 00:57:47
95.85.9.94 attackbotsspam
fail2ban
2020-05-15 01:07:06
104.243.22.179 attack
May 14 16:25:47 nextcloud sshd\[20535\]: Invalid user admin from 104.243.22.179
May 14 16:25:47 nextcloud sshd\[20535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.22.179
May 14 16:25:50 nextcloud sshd\[20535\]: Failed password for invalid user admin from 104.243.22.179 port 34136 ssh2
2020-05-15 01:03:25
109.69.5.120 attack
109.69.5.120 - - \[14/May/2020:14:24:47 +0200\] "POST /wp-login.php HTTP/1.0" 200 2889 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
109.69.5.120 - - \[14/May/2020:14:24:54 +0200\] "POST /wp-login.php HTTP/1.0" 200 2886 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
109.69.5.120 - - \[14/May/2020:14:24:57 +0200\] "POST /wp-login.php HTTP/1.0" 200 2889 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-15 00:30:55
62.171.179.14 spam
Tries to bruteforce SMTP connection.
2020-05-15 00:56:01
37.59.123.166 attackspambots
2020-05-14T13:38:44.856041shield sshd\[25129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.ip-37-59-123.eu  user=root
2020-05-14T13:38:46.539889shield sshd\[25129\]: Failed password for root from 37.59.123.166 port 48122 ssh2
2020-05-14T13:42:35.941181shield sshd\[26651\]: Invalid user admin from 37.59.123.166 port 56420
2020-05-14T13:42:35.943450shield sshd\[26651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.ip-37-59-123.eu
2020-05-14T13:42:37.674320shield sshd\[26651\]: Failed password for invalid user admin from 37.59.123.166 port 56420 ssh2
2020-05-15 01:02:53
5.255.96.42 attack
May 14 14:24:28 andromeda sshd\[4341\]: Invalid user qnap from 5.255.96.42 port 44802
May 14 14:24:28 andromeda sshd\[4341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.96.42
May 14 14:24:31 andromeda sshd\[4341\]: Failed password for invalid user qnap from 5.255.96.42 port 44802 ssh2
2020-05-15 00:57:15
106.13.129.37 attackspam
$f2bV_matches
2020-05-15 00:24:28

Recently Reported IPs

115.68.226.78 113.163.38.227 186.113.41.102 93.185.111.66
78.186.45.97 5.140.34.29 147.102.42.2 78.155.200.91
172.217.17.46 117.157.15.27 115.61.123.232 185.62.174.98
181.165.228.82 212.48.94.202 180.150.253.99 177.21.133.159
103.40.155.204 154.177.42.4 157.230.97.159 114.32.40.97