Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.155.42.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.155.42.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:48:03 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 3.42.155.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.42.155.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.52.43.89 attack
Automatic report - Banned IP Access
2019-10-16 23:30:31
184.22.210.65 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 23:30:46
5.200.93.153 attackbotsspam
Automatic report - Port Scan Attack
2019-10-16 23:19:15
60.255.144.162 attackspam
firewall-block, port(s): 1433/tcp
2019-10-16 23:21:44
106.36.69.8 attack
firewall-block, port(s): 23/tcp
2019-10-16 23:08:48
220.249.112.150 attackspambots
$f2bV_matches_ltvn
2019-10-16 23:20:57
115.159.220.190 attackbotsspam
Oct 16 13:49:37 master sshd[6839]: Failed password for root from 115.159.220.190 port 37092 ssh2
Oct 16 13:59:05 master sshd[6843]: Failed password for root from 115.159.220.190 port 53720 ssh2
Oct 16 14:03:42 master sshd[7153]: Failed password for invalid user server02 from 115.159.220.190 port 35972 ssh2
Oct 16 14:08:12 master sshd[7155]: Failed password for root from 115.159.220.190 port 46462 ssh2
Oct 16 14:12:49 master sshd[7163]: Failed password for invalid user jfortunato from 115.159.220.190 port 56952 ssh2
Oct 16 14:17:14 master sshd[7181]: Failed password for invalid user kiss from 115.159.220.190 port 39200 ssh2
2019-10-16 23:18:43
46.176.125.13 attack
Telnet Server BruteForce Attack
2019-10-16 23:17:44
114.34.164.236 attackspambots
Probing for phpMyAdmin access.

114.34.164.236 - - [16/Oct/2019:11:20:29 +0000] "GET /phpmyadmin/index.php?lang=en HTTP/1.1" 403 555 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36"
2019-10-16 23:02:58
185.10.68.96 attack
10/16/2019-09:46:26.365069 185.10.68.96 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-16 23:33:10
92.118.37.95 attackspambots
firewall-block, port(s): 3511/tcp, 3537/tcp, 3545/tcp
2019-10-16 23:12:40
220.225.126.55 attack
$f2bV_matches
2019-10-16 22:52:47
188.113.155.98 attackbotsspam
[portscan] Port scan
2019-10-16 23:11:15
12.109.102.86 attack
Automatic report - Banned IP Access
2019-10-16 22:56:14
202.77.112.245 attack
Oct 16 12:57:45 game-panel sshd[29224]: Failed password for root from 202.77.112.245 port 50656 ssh2
Oct 16 13:02:35 game-panel sshd[29401]: Failed password for root from 202.77.112.245 port 32900 ssh2
Oct 16 13:07:20 game-panel sshd[29533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.112.245
2019-10-16 23:01:29

Recently Reported IPs

49.189.133.95 71.53.29.223 136.136.133.42 67.50.18.74
165.121.133.36 107.223.127.32 15.114.64.141 21.143.252.26
159.248.121.72 179.180.37.14 160.136.58.8 75.186.244.177
58.47.236.14 54.98.25.47 168.231.255.58 13.123.88.110
189.53.163.50 60.56.242.100 53.135.181.232 25.251.161.186