Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 243.53.42.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;243.53.42.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 10:06:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 106.42.53.243.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.42.53.243.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.28.168.4 attackbots
Oct 14 20:05:53 eola sshd[30524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.168.4  user=r.r
Oct 14 20:05:55 eola sshd[30524]: Failed password for r.r from 218.28.168.4 port 12736 ssh2
Oct 14 20:05:55 eola sshd[30524]: Received disconnect from 218.28.168.4 port 12736:11: Bye Bye [preauth]
Oct 14 20:05:55 eola sshd[30524]: Disconnected from 218.28.168.4 port 12736 [preauth]
Oct 14 20:30:52 eola sshd[31448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.168.4  user=r.r
Oct 14 20:30:54 eola sshd[31448]: Failed password for r.r from 218.28.168.4 port 13660 ssh2
Oct 14 20:30:54 eola sshd[31448]: Received disconnect from 218.28.168.4 port 13660:11: Bye Bye [preauth]
Oct 14 20:30:54 eola sshd[31448]: Disconnected from 218.28.168.4 port 13660 [preauth]
Oct 14 20:36:59 eola sshd[31589]: Invalid user red5server from 218.28.168.4 port 12574
Oct 14 20:36:59 eola sshd[31589]: pam_uni........
-------------------------------
2019-10-17 01:36:57
123.214.186.186 attackspambots
FTP Brute-Force reported by Fail2Ban
2019-10-17 01:34:55
122.224.203.228 attack
Oct 16 19:06:12 vpn01 sshd[8733]: Failed password for root from 122.224.203.228 port 53858 ssh2
...
2019-10-17 02:12:55
198.13.57.175 attack
Oct 16 00:24:02 django sshd[89365]: reveeclipse mapping checking getaddrinfo for 198.13.57.175.vultr.com [198.13.57.175] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 16 00:24:02 django sshd[89365]: Invalid user adm1 from 198.13.57.175
Oct 16 00:24:02 django sshd[89365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.13.57.175 
Oct 16 00:24:04 django sshd[89365]: Failed password for invalid user adm1 from 198.13.57.175 port 40620 ssh2
Oct 16 00:24:04 django sshd[89367]: Received disconnect from 198.13.57.175: 11: Bye Bye
Oct 16 00:29:22 django sshd[89769]: reveeclipse mapping checking getaddrinfo for 198.13.57.175.vultr.com [198.13.57.175] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 16 00:29:22 django sshd[89769]: Invalid user ubnt from 198.13.57.175
Oct 16 00:29:22 django sshd[89769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.13.57.175 


........
-----------------------------------------------
https://www.blocklist.de/en/vi
2019-10-17 01:58:40
103.108.244.4 attack
2019-10-16 17:05:47,891 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 103.108.244.4
2019-10-16 17:41:28,923 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 103.108.244.4
2019-10-16 18:14:42,464 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 103.108.244.4
2019-10-16 18:49:09,618 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 103.108.244.4
2019-10-16 19:21:52,724 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 103.108.244.4
...
2019-10-17 02:14:53
184.105.247.220 attack
3389BruteforceFW21
2019-10-17 02:01:43
112.114.105.128 attack
26 probes for various archive files
2019-10-17 01:51:11
118.122.77.80 attack
Oct 16 18:08:02 h2177944 sshd\[18954\]: Failed password for root from 118.122.77.80 port 44654 ssh2
Oct 16 19:08:55 h2177944 sshd\[21805\]: Invalid user ADMIN from 118.122.77.80 port 51112
Oct 16 19:08:55 h2177944 sshd\[21805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.122.77.80
Oct 16 19:08:57 h2177944 sshd\[21805\]: Failed password for invalid user ADMIN from 118.122.77.80 port 51112 ssh2
...
2019-10-17 01:41:51
45.76.149.19 attackbots
wp-login.php
2019-10-17 02:03:46
123.25.30.88 attackspam
" "
2019-10-17 01:53:42
42.104.97.238 attackbots
SSH Brute Force, server-1 sshd[31516]: Failed password for invalid user net from 42.104.97.238 port 48231 ssh2
2019-10-17 01:45:59
197.89.244.179 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-17 01:52:00
47.75.172.46 attackspambots
www.goldgier.de 47.75.172.46 \[16/Oct/2019:14:56:41 +0200\] "POST /wp-login.php HTTP/1.1" 200 8727 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.goldgier.de 47.75.172.46 \[16/Oct/2019:14:56:43 +0200\] "POST /wp-login.php HTTP/1.1" 200 8727 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-17 01:59:20
196.52.43.86 attackbotsspam
Exploid host for vulnerabilities on 16-10-2019 14:20:30.
2019-10-17 01:32:48
62.83.197.11 attack
Fail2Ban Ban Triggered
2019-10-17 02:06:29

Recently Reported IPs

98.198.171.140 246.113.128.241 46.184.54.254 129.169.88.26
239.54.211.154 18.103.120.50 164.4.15.182 4.5.212.252
132.17.251.186 85.231.96.132 65.166.13.164 186.205.246.238
202.149.179.236 156.100.217.129 96.117.173.55 75.12.204.69
195.87.77.9 205.128.226.198 61.64.74.243 211.242.229.19