Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fjerritslev

Region: North Denmark

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.10.18.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.10.18.142.			IN	A

;; AUTHORITY SECTION:
.			186	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 08:08:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
142.18.10.212.in-addr.arpa domain name pointer d40a128e.rev.stofanet.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.18.10.212.in-addr.arpa	name = d40a128e.rev.stofanet.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
107.152.176.47 attackspambots
(From bishopbethWeb@gmail.com) Hello there! 

Would you'd be interested in building a mobile app for your business? I'm a mobile app developer that can design and program on any platform (Android, iOs) for an affordable price. There are various types of apps that can help your business, whether in terms of marketing, business efficiency, or both. If you already have some ideas, I would love to hear about them to help you more on how we can make them all possible. 

I have many ideas of my own that I'd really like to share with you of things that have worked really well for my other clients. If you're interested in building an app, or getting more information about it, then I'd love to give you a free consultation. Kindly reply to let me know when you'd like to be contacted. I hope to speak with you soon!h 

Best regards,
Beth Bishop
2019-12-03 16:17:37
103.35.64.73 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-03 15:50:07
36.235.82.206 attack
" "
2019-12-03 16:09:37
81.192.91.194 attack
firewall-block, port(s): 445/tcp
2019-12-03 15:54:07
142.93.131.42 attackbotsspam
Port 22 Scan, PTR: PTR record not found
2019-12-03 15:52:22
182.61.59.143 attackspambots
Dec  2 21:28:54 hanapaa sshd\[13256\]: Invalid user boisson from 182.61.59.143
Dec  2 21:28:54 hanapaa sshd\[13256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.59.143
Dec  2 21:28:56 hanapaa sshd\[13256\]: Failed password for invalid user boisson from 182.61.59.143 port 40639 ssh2
Dec  2 21:37:09 hanapaa sshd\[14025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.59.143  user=root
Dec  2 21:37:11 hanapaa sshd\[14025\]: Failed password for root from 182.61.59.143 port 46070 ssh2
2019-12-03 15:58:17
109.12.217.42 attackbotsspam
Dec  3 08:30:33 MK-Soft-VM3 sshd[5188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.12.217.42 
Dec  3 08:30:35 MK-Soft-VM3 sshd[5188]: Failed password for invalid user server from 109.12.217.42 port 52203 ssh2
...
2019-12-03 16:21:56
51.75.248.241 attackspambots
<6 unauthorized SSH connections
2019-12-03 16:03:27
133.130.99.77 attackbotsspam
Dec  2 21:55:49 kapalua sshd\[19924\]: Invalid user dalu from 133.130.99.77
Dec  2 21:55:49 kapalua sshd\[19924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-99-77.a028.g.tyo1.static.cnode.io
Dec  2 21:55:50 kapalua sshd\[19924\]: Failed password for invalid user dalu from 133.130.99.77 port 35398 ssh2
Dec  2 22:01:56 kapalua sshd\[20519\]: Invalid user guest321 from 133.130.99.77
Dec  2 22:01:56 kapalua sshd\[20519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-99-77.a028.g.tyo1.static.cnode.io
2019-12-03 16:08:43
36.89.163.178 attackspambots
Dec  3 05:00:35 sshd: Connection from 36.89.163.178 port 52419
Dec  3 05:00:38 sshd: Invalid user admin from 36.89.163.178
Dec  3 05:00:38 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.163.178
Dec  3 05:00:40 sshd: Failed password for invalid user admin from 36.89.163.178 port 52419 ssh2
Dec  3 05:00:41 sshd: Received disconnect from 36.89.163.178: 11: Bye Bye [preauth]
2019-12-03 16:09:51
45.77.241.51 attackspambots
Dec  2 22:06:42 hpm sshd\[22597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.77.241.51  user=root
Dec  2 22:06:44 hpm sshd\[22597\]: Failed password for root from 45.77.241.51 port 59842 ssh2
Dec  2 22:13:06 hpm sshd\[23308\]: Invalid user regena from 45.77.241.51
Dec  2 22:13:06 hpm sshd\[23308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.77.241.51
Dec  2 22:13:08 hpm sshd\[23308\]: Failed password for invalid user regena from 45.77.241.51 port 43150 ssh2
2019-12-03 16:17:54
222.186.180.223 attackbotsspam
Dec  3 09:00:54 minden010 sshd[20440]: Failed password for root from 222.186.180.223 port 45884 ssh2
Dec  3 09:01:06 minden010 sshd[20440]: Failed password for root from 222.186.180.223 port 45884 ssh2
Dec  3 09:01:06 minden010 sshd[20440]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 45884 ssh2 [preauth]
...
2019-12-03 16:02:45
92.222.84.34 attack
Dec  3 08:31:07 sso sshd[8072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.84.34
Dec  3 08:31:08 sso sshd[8072]: Failed password for invalid user bairos from 92.222.84.34 port 40744 ssh2
...
2019-12-03 15:48:24
148.101.67.102 attackspam
Dec  2 21:55:59 eddieflores sshd\[4543\]: Invalid user polsha from 148.101.67.102
Dec  2 21:55:59 eddieflores sshd\[4543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.101.67.102
Dec  2 21:56:01 eddieflores sshd\[4543\]: Failed password for invalid user polsha from 148.101.67.102 port 47735 ssh2
Dec  2 22:05:42 eddieflores sshd\[5334\]: Invalid user Gerard!23 from 148.101.67.102
Dec  2 22:05:42 eddieflores sshd\[5334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.101.67.102
2019-12-03 16:08:27
94.191.87.254 attackbots
Dec  3 08:40:42 MK-Soft-VM3 sshd[5689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.87.254 
Dec  3 08:40:43 MK-Soft-VM3 sshd[5689]: Failed password for invalid user maprdev from 94.191.87.254 port 47524 ssh2
...
2019-12-03 16:14:31

Recently Reported IPs

0.246.12.104 103.253.54.29 252.160.130.90 24.79.172.175
153.38.27.203 209.50.60.217 158.64.134.71 183.179.27.22
6.86.168.246 250.95.131.39 135.84.125.209 91.122.14.178
119.69.235.200 7.107.243.240 164.227.145.119 191.117.82.113
171.220.248.218 5.224.2.154 11.65.163.17 56.254.246.81