Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.42.68.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56420
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.42.68.92.			IN	A

;; AUTHORITY SECTION:
.			577	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 11:39:58 CST 2022
;; MSG SIZE  rcvd: 103
Host info
92.68.42.2.in-addr.arpa domain name pointer net-2-42-68-92.cust.vodafonedsl.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
92.68.42.2.in-addr.arpa	name = net-2-42-68-92.cust.vodafonedsl.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.236.195.214 attack
Unauthorized connection attempt from IP address 14.236.195.214 on Port 445(SMB)
2019-09-05 21:00:31
112.201.66.218 attack
DATE:2019-09-05 10:31:43, IP:112.201.66.218, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-09-05 20:33:25
186.207.77.127 attack
Sep  5 15:10:00 yabzik sshd[5563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.207.77.127
Sep  5 15:10:02 yabzik sshd[5563]: Failed password for invalid user admin from 186.207.77.127 port 46374 ssh2
Sep  5 15:15:52 yabzik sshd[7892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.207.77.127
2019-09-05 20:22:42
36.67.177.115 attackspambots
Unauthorized connection attempt from IP address 36.67.177.115 on Port 445(SMB)
2019-09-05 20:23:44
202.78.197.198 attackbotsspam
2019-09-05T12:20:45.749679abusebot-7.cloudsearch.cf sshd\[9015\]: Invalid user steamcmd from 202.78.197.198 port 60280
2019-09-05 20:44:04
36.72.212.35 attackspam
Unauthorized connection attempt from IP address 36.72.212.35 on Port 445(SMB)
2019-09-05 20:29:11
120.52.9.102 attackspambots
Sep  5 13:57:36 microserver sshd[20126]: Invalid user xavier from 120.52.9.102 port 24718
Sep  5 13:57:36 microserver sshd[20126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.9.102
Sep  5 13:57:38 microserver sshd[20126]: Failed password for invalid user xavier from 120.52.9.102 port 24718 ssh2
Sep  5 14:01:52 microserver sshd[20809]: Invalid user bdos from 120.52.9.102 port 16460
Sep  5 14:01:52 microserver sshd[20809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.9.102
Sep  5 14:14:38 microserver sshd[22302]: Invalid user raja from 120.52.9.102 port 42409
Sep  5 14:14:38 microserver sshd[22302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.9.102
Sep  5 14:14:41 microserver sshd[22302]: Failed password for invalid user raja from 120.52.9.102 port 42409 ssh2
Sep  5 14:19:04 microserver sshd[22941]: Invalid user opentsp from 120.52.9.102 port 48547
Sep  5 14:19:
2019-09-05 20:44:43
60.184.127.4 attackbotsspam
2019-09-05T08:56:09.469193mizuno.rwx.ovh sshd[11102]: Connection from 60.184.127.4 port 59740 on 78.46.61.178 port 22
2019-09-05T08:56:11.653162mizuno.rwx.ovh sshd[11102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.184.127.4  user=root
2019-09-05T08:56:13.073549mizuno.rwx.ovh sshd[11102]: Failed password for root from 60.184.127.4 port 59740 ssh2
2019-09-05T08:56:16.466058mizuno.rwx.ovh sshd[11102]: Failed password for root from 60.184.127.4 port 59740 ssh2
2019-09-05T08:56:09.469193mizuno.rwx.ovh sshd[11102]: Connection from 60.184.127.4 port 59740 on 78.46.61.178 port 22
2019-09-05T08:56:11.653162mizuno.rwx.ovh sshd[11102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.184.127.4  user=root
2019-09-05T08:56:13.073549mizuno.rwx.ovh sshd[11102]: Failed password for root from 60.184.127.4 port 59740 ssh2
2019-09-05T08:56:16.466058mizuno.rwx.ovh sshd[11102]: Failed password for root from 60.184.12
...
2019-09-05 20:42:28
78.132.104.111 attack
Automatic report - Banned IP Access
2019-09-05 20:14:54
77.247.110.68 attackspambots
\[2019-09-05 08:20:38\] NOTICE\[1829\] chan_sip.c: Registration from '"268" \' failed for '77.247.110.68:6294' - Wrong password
\[2019-09-05 08:20:38\] SECURITY\[1837\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-05T08:20:38.072-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="268",SessionID="0x7f7b30db7498",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.68/6294",Challenge="6f034401",ReceivedChallenge="6f034401",ReceivedHash="de3a70e2103ea3674ad3dc6cd428883e"
\[2019-09-05 08:20:38\] NOTICE\[1829\] chan_sip.c: Registration from '"268" \' failed for '77.247.110.68:6294' - Wrong password
\[2019-09-05 08:20:38\] SECURITY\[1837\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-05T08:20:38.180-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="268",SessionID="0x7f7b306fb678",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.2
2019-09-05 20:37:22
187.237.164.210 attackbots
Unauthorized connection attempt from IP address 187.237.164.210 on Port 445(SMB)
2019-09-05 20:43:47
35.188.72.153 attackspam
Sep  5 11:23:02 vtv3 sshd\[2563\]: Invalid user user from 35.188.72.153 port 47086
Sep  5 11:23:02 vtv3 sshd\[2563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.72.153
Sep  5 11:23:04 vtv3 sshd\[2563\]: Failed password for invalid user user from 35.188.72.153 port 47086 ssh2
Sep  5 11:30:56 vtv3 sshd\[6558\]: Invalid user vncuser from 35.188.72.153 port 41286
Sep  5 11:30:56 vtv3 sshd\[6558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.72.153
Sep  5 11:41:55 vtv3 sshd\[11958\]: Invalid user webserver from 35.188.72.153 port 59444
Sep  5 11:41:55 vtv3 sshd\[11958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.72.153
Sep  5 11:41:57 vtv3 sshd\[11958\]: Failed password for invalid user webserver from 35.188.72.153 port 59444 ssh2
Sep  5 11:45:47 vtv3 sshd\[13958\]: Invalid user ts3server from 35.188.72.153 port 46676
Sep  5 11:45:47 vtv3 sshd\[13958\]
2019-09-05 20:47:34
213.14.214.229 attackbots
Sep  5 14:19:59 eventyay sshd[4857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.14.214.229
Sep  5 14:20:00 eventyay sshd[4857]: Failed password for invalid user odoo from 213.14.214.229 port 42878 ssh2
Sep  5 14:23:52 eventyay sshd[4906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.14.214.229
...
2019-09-05 20:38:13
116.103.140.110 attack
Unauthorized connection attempt from IP address 116.103.140.110 on Port 445(SMB)
2019-09-05 20:57:43
117.4.203.103 attackbotsspam
Unauthorized connection attempt from IP address 117.4.203.103 on Port 445(SMB)
2019-09-05 20:56:37

Recently Reported IPs

2.39.254.157 109.108.87.154 88.247.21.45 188.4.20.214
2.39.196.32 2.39.245.14 2.39.214.86 36.68.234.82
23.236.255.246 23.236.247.235 36.73.55.163 169.229.207.166
36.73.42.138 127.192.116.207 23.238.205.167 37.57.79.33
37.60.208.82 37.60.210.97 37.60.211.93 37.60.213.199