Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 234.194.56.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2911
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;234.194.56.42.			IN	A

;; AUTHORITY SECTION:
.			405	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 11:32:18 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 42.56.194.234.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.56.194.234.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.7.37.44 attack
Unauthorized connection attempt from IP address 103.7.37.44 on Port 445(SMB)
2019-11-06 05:10:27
117.204.6.202 attackspam
Unauthorized connection attempt from IP address 117.204.6.202 on Port 445(SMB)
2019-11-06 05:01:40
117.6.133.115 attackbots
Unauthorized connection attempt from IP address 117.6.133.115 on Port 445(SMB)
2019-11-06 05:15:45
85.214.133.248 attackbotsspam
RDP Bruteforce
2019-11-06 05:28:45
171.241.133.37 attackspam
Unauthorized connection attempt from IP address 171.241.133.37 on Port 445(SMB)
2019-11-06 05:08:27
37.44.212.19 attackspambots
Abuse
2019-11-06 05:29:01
94.25.60.71 attackspambots
Unauthorized connection attempt from IP address 94.25.60.71 on Port 445(SMB)
2019-11-06 05:26:01
45.71.75.69 attack
Unauthorized connection attempt from IP address 45.71.75.69 on Port 445(SMB)
2019-11-06 05:30:16
113.140.75.205 attack
$f2bV_matches
2019-11-06 04:56:19
45.148.10.24 attackspambots
2019-11-05T17:21:57.050355mail01 postfix/smtpd[5156]: warning: unknown[45.148.10.24]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05T17:22:51.055462mail01 postfix/smtpd[10679]: warning: unknown[45.148.10.24]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05T17:31:40.209049mail01 postfix/smtpd[25017]: warning: unknown[45.148.10.24]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-06 05:18:32
139.198.189.36 attack
Nov  5 21:54:37 dedicated sshd[9462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.189.36  user=root
Nov  5 21:54:39 dedicated sshd[9462]: Failed password for root from 139.198.189.36 port 37208 ssh2
2019-11-06 05:10:41
184.100.18.80 attack
WEB_SERVER 403 Forbidden
2019-11-06 05:21:57
184.59.27.136 attack
WEB_SERVER 403 Forbidden
2019-11-06 05:30:32
140.143.15.169 attackbots
$f2bV_matches
2019-11-06 05:04:04
202.6.233.8 attackspambots
Unauthorized connection attempt from IP address 202.6.233.8 on Port 445(SMB)
2019-11-06 05:34:54

Recently Reported IPs

233.64.255.110 177.46.140.182 47.202.227.123 193.155.15.120
100.75.74.164 88.155.51.228 132.89.230.23 49.244.205.82
226.155.165.221 193.123.40.217 204.184.142.125 102.252.238.174
0.42.57.253 51.83.171.233 180.198.205.26 174.197.140.152
113.194.169.157 82.205.24.35 227.2.7.134 166.230.64.182