Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 28.149.28.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;28.149.28.42.			IN	A

;; AUTHORITY SECTION:
.			52	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011402 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 15 08:13:19 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 42.28.149.28.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.28.149.28.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.64.94.221 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-13 00:16:35
70.132.62.88 attackspam
Automatic report generated by Wazuh
2019-11-13 00:19:14
91.207.40.44 attackspam
Nov 12 16:47:53 vps691689 sshd[2166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.44
Nov 12 16:47:55 vps691689 sshd[2166]: Failed password for invalid user janbjarne from 91.207.40.44 port 54716 ssh2
...
2019-11-13 00:21:30
78.188.105.52 attackbots
Automatic report - Port Scan Attack
2019-11-12 23:51:49
90.224.11.107 attackbots
Automatic report - XMLRPC Attack
2019-11-13 00:19:03
114.64.255.188 attackspam
Nov 12 16:57:35 taivassalofi sshd[57204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.64.255.188
Nov 12 16:57:37 taivassalofi sshd[57204]: Failed password for invalid user zarzour from 114.64.255.188 port 55278 ssh2
...
2019-11-13 00:21:51
13.93.32.153 attackspam
2019-11-12T16:30:36.008109mail01 postfix/smtpd[25320]: warning: unknown[13.93.32.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-12T16:31:54.327086mail01 postfix/smtpd[25320]: warning: unknown[13.93.32.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-12T16:33:13.300366mail01 postfix/smtpd[10634]: warning: unknown[13.93.32.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-12 23:53:47
193.32.163.102 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-12 23:59:32
212.64.72.20 attackbots
Nov 12 16:45:28 v22019058497090703 sshd[5873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.72.20
Nov 12 16:45:30 v22019058497090703 sshd[5873]: Failed password for invalid user pieter from 212.64.72.20 port 44240 ssh2
Nov 12 16:50:34 v22019058497090703 sshd[6242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.72.20
...
2019-11-13 00:18:17
222.186.169.194 attackbotsspam
SSH brutforce
2019-11-12 23:56:14
78.47.114.131 attackspam
SMTP brute-force
2019-11-13 00:17:04
45.136.110.0 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-12 23:52:51
92.246.76.199 attackspambots
Port scan on 6 port(s): 40134 40212 40470 40502 40546 40708
2019-11-12 23:49:30
52.165.80.86 attack
Automatically reported by fail2ban report script (mx1)
2019-11-12 23:50:07
159.203.201.39 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-13 00:06:41

Recently Reported IPs

234.124.98.77 193.193.79.112 136.251.109.36 221.245.82.96
112.204.162.155 205.53.171.236 157.49.176.244 105.67.191.58
181.215.46.74 85.225.46.230 246.133.22.3 46.119.247.248
158.241.57.228 131.60.176.26 137.171.201.120 64.119.165.51
55.38.160.123 160.25.174.182 237.212.175.163 132.127.228.80