Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 209.134.128.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;209.134.128.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 05:30:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 42.128.134.209.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.128.134.209.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.131.96.177 attackbotsspam
Oct 12 13:59:08 herz-der-gamer sshd[23835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.96.177  user=root
Oct 12 13:59:10 herz-der-gamer sshd[23835]: Failed password for root from 104.131.96.177 port 49240 ssh2
Oct 12 14:12:40 herz-der-gamer sshd[24165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.96.177  user=root
Oct 12 14:12:43 herz-der-gamer sshd[24165]: Failed password for root from 104.131.96.177 port 50594 ssh2
...
2019-10-12 21:56:45
191.8.126.87 attackspambots
SMB Server BruteForce Attack
2019-10-12 21:54:42
51.68.195.146 attackspambots
Port scan on 1 port(s): 139
2019-10-12 22:07:01
121.23.23.41 attackspambots
2019/10/12 03:55:53 [error] 1939#1939: *4042 open() "/srv/automx/instance/cgi-bin/ViewLog.asp" failed (2: No such file or directory), client: 121.23.23.41, server: autoconfig.tuxlinux.eu, request: "POST /cgi-bin/ViewLog.asp HTTP/1.1", host: "127.0.0.1"
2019/10/12 07:50:49 [error] 1935#1935: *4199 open() "/srv/automx/instance/cgi-bin/ViewLog.asp" failed (2: No such file or directory), client: 121.23.23.41, server: autoconfig.tuxlinux.eu, request: "POST /cgi-bin/ViewLog.asp HTTP/1.1", host: "127.0.0.1"
...
2019-10-12 21:53:06
172.245.181.229 attack
(From EdFrez689@gmail.com) Hi!

Current trends on web design aren't just focused on aesthetics.They also have features integrated with your business processes that hep you run the business easier and gets you more new clients. I'm a web designer/developer working from home who can provide you with all of the features of a modern website, as well as a stunning user-interface.

I sent you this message because I'd like to know if you need some help with your website. I'm able to work with most of the major programming languages, website platforms, and shopping carts. I specialize in one platform that is truly incredible called WordPress. Developing your site on such an incredible platform that provides you with an incredible number of features allows you to personally make changes to your site in an easy and simple manner.

I'd like to know some of your ideas for the site and provide you with a few of my own as well. Would you be interested to know more about what I can do? If so, I will give you a free co
2019-10-12 21:44:46
81.22.45.237 attackbotsspam
2019-10-12T14:12:06.134345+02:00 lumpi kernel: [704739.742799] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.237 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=36023 PROTO=TCP SPT=44106 DPT=5566 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-12 21:57:40
1.203.115.140 attack
SSH invalid-user multiple login try
2019-10-12 22:15:46
80.84.57.109 attack
Looking for store, etc. Which I don't have.
2019-10-12 21:39:23
211.151.95.139 attackspam
Oct 12 10:15:50 firewall sshd[18701]: Failed password for root from 211.151.95.139 port 35886 ssh2
Oct 12 10:20:40 firewall sshd[18812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.151.95.139  user=root
Oct 12 10:20:41 firewall sshd[18812]: Failed password for root from 211.151.95.139 port 41020 ssh2
...
2019-10-12 21:33:09
180.183.168.235 attack
Unauthorised access (Oct 12) SRC=180.183.168.235 LEN=52 TTL=113 ID=14252 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-12 21:35:29
220.134.130.253 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/220.134.130.253/ 
 TW - 1H : (299)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 220.134.130.253 
 
 CIDR : 220.134.128.0/18 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 13 
  3H - 30 
  6H - 64 
 12H - 122 
 24H - 293 
 
 DateTime : 2019-10-12 07:50:55 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-12 21:50:32
198.108.67.142 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-12 22:06:31
49.234.28.54 attackbotsspam
$f2bV_matches
2019-10-12 21:36:45
139.59.77.237 attackspambots
Oct 12 03:57:34 xtremcommunity sshd\[440560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237  user=root
Oct 12 03:57:36 xtremcommunity sshd\[440560\]: Failed password for root from 139.59.77.237 port 35181 ssh2
Oct 12 04:02:08 xtremcommunity sshd\[440651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237  user=root
Oct 12 04:02:10 xtremcommunity sshd\[440651\]: Failed password for root from 139.59.77.237 port 54472 ssh2
Oct 12 04:06:40 xtremcommunity sshd\[440733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237  user=root
...
2019-10-12 22:17:00
118.24.8.84 attackspam
Oct 12 12:36:14 sshgateway sshd\[3829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.8.84  user=root
Oct 12 12:36:16 sshgateway sshd\[3829\]: Failed password for root from 118.24.8.84 port 39310 ssh2
Oct 12 12:42:05 sshgateway sshd\[3853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.8.84  user=root
2019-10-12 21:57:20

Recently Reported IPs

249.90.36.33 14.75.178.143 248.67.164.135 240.30.149.249
32.53.125.114 81.238.238.137 6.244.220.76 153.149.181.176
71.112.95.179 232.15.66.145 32.174.169.222 163.83.41.6
96.27.16.109 13.246.206.77 65.247.66.13 56.80.156.136
252.236.210.90 123.9.167.206 94.102.148.10 229.211.35.187